CN105306301B - A kind of method and system monitoring credible counting device - Google Patents
A kind of method and system monitoring credible counting device Download PDFInfo
- Publication number
- CN105306301B CN105306301B CN201510738331.XA CN201510738331A CN105306301B CN 105306301 B CN105306301 B CN 105306301B CN 201510738331 A CN201510738331 A CN 201510738331A CN 105306301 B CN105306301 B CN 105306301B
- Authority
- CN
- China
- Prior art keywords
- counting device
- credible
- information
- module
- credible counting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The present invention relates to a kind of method and system for monitoring credible counting device, and wherein method is the following steps are included: carry out security initialization to credible counting device;Monitor the operating status of credible counting device in real time;Credible counting device is upgraded according to upgrade request.The beneficial effects of the present invention are: monitoring device security initialization can guarantee it is to issue unmodified by device to be started, license, and the configuration information that it is loaded is legal.The monitoring to the real-time status of device may be implemented in device operation monitoring and abnormal alarm function, when abnormal alarm occurs in device it is timely handled.Equipment safety upgrade function can guarantee that legal running gear can be carried out safe upgrading, i.e., not will cause illegal device and upgrade to legal device, unavailable after legal device will not be made to upgrade.
Description
Technical field
The present invention relates to a kind of method and system for monitoring credible counting device.
Background technique
The high speed development of computer and network technologies makes internet be dissolved into each neck of social life more and more
Domain, oneself becomes people's work, a part indispensable in studying and living to network, people indulge in luxuriousness to one's heart's desire network for we with
Come it is convenient, efficient and shared while, also the moment suffers from full spectrum of threats brought by cyber-attack and destructive insident.In order to
The safety of Logistics networks transaction, we devise credible counting device.But if credible counting device is inherently in uneasiness
In the state of complete, then the Secure Transaction of counter guarantee is namely indulge in empty talk.If running program on counting device is to be modified
It crosses, then the Transaction Information of the counter may be forged, it is possible to unreasonable exchange data occur, influence transaction
The supervision effect that fairness and counting device are played;If counting device is in the work stopped and fills state, however does not go partially
It was found that it, the progress then this normally trades serious shadow.These will be efficiently solved by designing a kind of counting device monitoring system
Problem.
Patent: monitoring system (patent No.: CN101986704A) designs a kind of monitoring system, including monitoring module, client
Terminal, remote control module, the monitoring module, client terminal and remote control module are connected with internet, institute
Monitoring module is stated for obtaining monitoring information and by monitoring information transmission to internet, the client terminal can connect
Receive the monitoring information and show the monitoring information, the remote control module can receive and store the monitoring information,
And the monitoring information can be exported according to the demand of user.The beneficial effects of the invention are as follows because of client terminal and long-range control mould
Block is connected with i nternet network, and the client terminal can receive the monitoring information and show the monitoring letter
Breath, so by Internet network real-time Transmission monitored site instant video, realization is either in office building, in monitoring
The heart still whenever and wherever possible supervises the current situation of monitored site far away from can be transferred through I nternet network all over the world
Control.But it can only monitor the operation dress state of network entity, and make specific present.But it cannot be guaranteed that monitoring system is credible to reality
, and online upgrading cannot be carried out to the object of monitoring.
There are some data liquidation center [Minimizing in domestic and international existing digital copyright protection system
Retrieval Cost of Multi-Layer Content Distribution Systems,A portion-based
content distribution strategy in streaming media content distribution
Networks], for generating and distributing digital license, realize the financial transactions affairs such as user identity authentication, triggering payment.But
In copyright process of exchange, retailer and provider do not set up believable third party as monitoring party, thus can not
It solves the problems, such as the distrust due to both parties and generates dispute.
Summary of the invention
Achieve the purpose that effectively to supervise technical problem to be solved by the invention is to provide a kind of, introduces trusted third party's ginseng
With realize the fair deal of both sides, and ensure that the method and system of the credible counting device of monitoring of non-repudiation.
The technical scheme to solve the above technical problems is that a kind of method for monitoring credible counting device, including
Following steps:
Step 1: security initialization is carried out to credible counting device;
Step 2: monitoring the starting state and operating status of credible counting device in real time;
Step 3: safety upgrade is carried out to credible counting device according to upgrade request.
The beneficial effects of the present invention are: monitoring device security initialization can guarantee that by device to be started be to issue not
It is modified, it licenses, and the configuration information that it is loaded is legal.Device operation monitoring and abnormal alarm function can
To realize the monitoring to the real-time status of device, when abnormal alarm occurs in device it is timely handled.Device peace
Full upgrade function can guarantee that legal running gear can be carried out safe upgrading, i.e., not will cause illegal device and upgrade to
Legal device, it is unavailable after legal device will not be made to upgrade.
Based on the above technical solution, the present invention can also be improved as follows.
Further, a kind of method monitoring credible counting device according to claim 1, which is characterized in that described
Step 1 specifically includes the following steps:
Step 1.1: distributing credible counting device to user according to user's request;
Step 1.2: configuration module receives the relevant information by encryption that credible counting device is sent, according to relevant information
Obtain configuration information;
Step 1.3: judging whether credible counting device is legal with the configuration information, if so, executing step 2;Otherwise,
Initialization failure information is sent, is terminated.
Beneficial effect using above-mentioned further scheme is, it is ensured that by device to be started be issue it is unmodified
, it licenses, and the configuration information that it is loaded is legal.
Further, the step 2 specifically includes the following steps:
Step 2.1: it is whether legal in starting state information by the verifying judgment means to static information, if legal,
Then device starting operation, executes step 2.2;If not conforming to rule stops starting, terminate;
Step 2.2: the running state information by encryption of credible counting device is obtained at interval of preset time;
Step 2.3: information judges whether credible counting device operation is normal according to the operation state, if so, executing
Step 3;Otherwise, it sends and is operating abnormally alarm, terminate.
The static information includes one or more of information such as configuration information and software summary info in device.
Beneficial effect using above-mentioned further scheme is that may be implemented to the monitoring of the real-time status of device, works as device
Abnormal alarm occur handles it timely.
Further, the step 3 specifically includes the following steps:
Step 3.1: judging whether to receive upgrade request, if so, executing step 3.2;Otherwise, continuing current operation can
Believe counting device;
Step 3.2: the relevant information by encryption of credible counting device is obtained, it is current credible according to relevant information judgement
Whether counting device can upgrade, if so, being upgraded, credible counting device after being upgraded, credible meter after operation upgrading
Counting apparatus;Otherwise, upgrading failure, continuation currently run credible counting device.
Beneficial effect using above-mentioned further scheme is, it is ensured that legal running gear can be carried out safe liter
Grade, i.e., not will cause illegal device and upgrade to legal device, unavailable after legal device will not be made to upgrade.
Further, the relevant information by encryption that the credible counting device is sent includes device version information, static state
One or more of program digest information, dynamic memory summary info and configuration excerpt information etc..
The technical scheme to solve the above technical problems is that a kind of system for monitoring credible counting device, including
Initialization module, monitoring module and upgraded module;
The initialization module is used to carry out security initialization to credible counting device;
The monitoring module is used to monitor in real time the starting state and operating status of credible counting device;
The upgraded module is used to carry out safety upgrade to credible counting device according to upgrade request.
The beneficial effects of the present invention are: monitoring device security initialization can guarantee that by device to be started be to issue not
It is modified, it licenses, and the configuration information that it is loaded is legal.Device operation monitoring and abnormal alarm function can
To realize the monitoring to the real-time status of device, when abnormal alarm occurs in device it is timely handled.Device peace
Full upgrade function can guarantee that legal running gear can be carried out safe upgrading, i.e., not will cause illegal device and upgrade to
Legal device, it is unavailable after legal device will not be made to upgrade.
Based on the above technical solution, the present invention can also be improved as follows.
Further, the initialization module includes distribution module, configuration module and first judgment module;
The distribution module is used to distribute credible counting device to user according to user's request;
The configuration module is used to receive the relevant information by encryption that credible counting device is sent, according to relevant information
Obtain configuration information;
Whether the first judgment module is legal with the configuration information for judging credible counting device, if so, holding
Row monitors the operating status of credible counting device in real time;Otherwise, initialization failure information is sent, is terminated.
Beneficial effect using above-mentioned further scheme is, it is ensured that by device to be started be issue it is unmodified
, it licenses, and the configuration information that it is loaded is legal.
Further, the monitoring module includes starting judgment module, data obtaining module and the second judgment module;
Whether the starting judgment module by the verifying judgment means to static information in starting state information for being closed
Method, if legal, device starting operation triggers data obtaining module;If not conforming to rule stops starting;
The data obtaining module is used to obtain the operation shape by encryption of credible counting device at interval of preset time
State information, data obtaining module verify its dynamic memory information;
Second judgment module judges whether credible counting device operation is normal for information according to the operation state,
If so, continuing to run credible counting device, credible counting device is upgraded according to upgrade request;Otherwise, operation is sent
Abnormality alarming terminates.
The static information includes one or more of information such as configuration information and software summary info in device.
Beneficial effect using above-mentioned further scheme is that may be implemented to the monitoring of the real-time status of device, works as device
Abnormal alarm occur handles it timely.
Further, the upgraded module includes third judgment module and upgrading judging module;
The third judgment module is for judging whether to receive upgrade request, if so, triggering upgrading judgment module;It is no
Then, continue currently to run credible counting device;
The upgrading judging module is used to obtain the relevant information by encryption of credible counting device, according to relevant information
Judge whether current credible counting device can upgrade, if so, being upgraded, credible counting device after being upgraded, runs
Credible counting device after upgrading;Otherwise, upgrading failure, continuation currently run credible counting device.
Beneficial effect using above-mentioned further scheme is, it is ensured that legal running gear can be carried out safe liter
Grade, i.e., not will cause illegal device and upgrade to legal device, unavailable after legal device will not be made to upgrade.
Further, the relevant information by encryption that the credible counting device is sent includes device version information, static state
One or more of program digest information, dynamic memory summary info and configuration excerpt information etc..
Supervision of the invention is directed to digital content works, impacts for the piracy of digital content works, protects copyright
Copyright reinforces copyright transaction supervision.In order to achieve the purpose that effectively to supervise, introduces trusted third party and participate in, realize double
The fair deal of side, and ensure that non-repudiation.The function of the monitoring of credible counter device includes equipment safety initialization,
Device operation monitoring and abnormal alarm and equipment safety upgrading etc..
Detailed description of the invention
Fig. 1 is a kind of method flow diagram for monitoring credible counting device of the present invention;
Fig. 2 is security initialization flow chart described in the embodiment of the present invention 1;
Fig. 3 is the starting state monitoring figure of the credible counting device of real time monitoring described in the embodiment of the present invention 1;
Fig. 4 is the operating status flow chart of the credible counting device of real time monitoring described in the embodiment of the present invention 1;
Fig. 5 is to carry out upgrading flow chart to credible counting device described in the embodiment of the present invention 1;
Fig. 6 is a kind of system structure diagram for monitoring credible counting device of the present invention.
In attached drawing, parts list represented by the reference numerals are as follows:
1, initialization module, 2, monitoring module, 3, upgraded module.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and
It is non-to be used to limit the scope of the invention.
As shown in Figure 1, being a kind of method for monitoring credible counting device of the present invention, comprising the following steps:
Step 1: security initialization is carried out to credible counting device;
Step 2: monitoring the starting state and operating status of credible counting device in real time;
Step 3: safety upgrade is carried out to credible counting device according to upgrade request.
As shown in Fig. 2, security initialization described in the embodiment of the present invention 1 specifically includes the following steps:
Registration and authorization server distribute credible counting to user according to user's request and fill to user's transmission registration information
It sets;
Credible counting device sends to monitoring system and sends device version through identity ciphering, static routine abstract, dynamic
The information such as memory abstract and configuration information digest value;
Monitoring system requests other use to registration and authorization server according to version information under the identity of credible counting device
In the data of verifying;
The initialization information for verifying credible counter device, is such as verified, and sends the dress with authorization server to registration
Set normal initialization result;Otherwise, the incorrect warning of device initialization information is sent with authorization server to registration.
As shown in figure 3, the starting state for the credible counting device of real time monitoring described in the embodiment of the present invention 1 includes following step
It is rapid:
Credible counting device sends the device version encrypted through identity information to monitoring system, executes program and rig
Manage the contents such as information;
Monitoring system requests other use to registration and authorization server according to version information under the identity of credible counting device
In the data of verifying;
Whether verifying attachment operation is abnormal, if normally, normal credible counting device;Otherwise, it is sent to associated server
The device starts abnormality warnings, sends abnormality alarming, terminates.
As shown in figure 4, the operating status for the credible counting device of real time monitoring described in the embodiment of the present invention 1 includes following step
It is rapid:
Credible counting device sends the information such as the device version encrypted through identity information and operating status to monitoring system;
Monitoring system requests other use to registration and authorization server according to version information under the identity of credible counting device
In the data of verifying;
Whether verifying attachment operation is abnormal, if normally, continuing to run credible counting device;Otherwise, to associated server
It sends the device and is operating abnormally warning, send and be operating abnormally alarm, terminate.
As shown in figure 5, to be upgraded described in the embodiment of the present invention 1 to credible counting device specifically includes the following steps:
Judge whether to receive upgrade request, if so, performing the next step;Otherwise, continue currently to run credible counting dress
It sets;
Monitoring system sends upgrading to device and requires;
Credible counting device sends present apparatus digest value, version information and configuration etc. through identity ciphering to monitoring system
Information;
Monitoring system is used to verify present apparatus to registration according to device identity with authorization server request relevant information
It is no scalable;If so, being upgraded, credible counting device after being upgraded, credible counting device after operation upgrading;Otherwise,
Upgrading failure, continuation currently run credible counting device, send the device verification result with authorization server to registration.
Upgrading may be selected notice registration and carry out online upgrading with authorization server;Or notify relevant staff carry out from
The upgrading of informant's work.
As shown in fig. 6, being a kind of system for monitoring credible counting device of the present invention, including initialization module 1, prison
Control module 2 and upgraded module 3;
The initialization module 1 is used to carry out security initialization to credible counting device;
The monitoring module 2 is used to monitor in real time the starting state and operating status of credible counting device;
The upgraded module 3 is for upgrading credible counting device according to upgrade request.
Implementation example of the invention is as follows:
This programme can be used using identifying algorithms such as RSA, ID-based cryptosystem algorithms, carry out used here as RSA Algorithm
Authentication and encryption, and issue related credentials to counting device and show each device identity, hash algorithm can be used SHA1 into
The digest calculations of row relevant information.
1, equipment safety initializes
Device using RSA private key encryption software version information, all softwares digest value, be loaded into memory memory it is empty
Between digest value and configuration information digest value, generate ciphertext to monitoring system send.
Monitoring system requests the soft of the device to pertinent registration and authorization server to the certificate of CA server request unit
Part version, software and the digest value of configuration.Verify whether that device has carried out security initialization, if dangerous to registration and award
It weighs server and sends warning message.
2, device operation monitoring and abnormal alarm
Device sends heartbeat message to monitoring server every 1s, it is device each section by RSA private key encryption
Running state information.
Monitoring system is requesting the operation of the device just to registration and authorization server to the certificate of CA server request unit
Constant value is compared with the status information of the device sended over, and if there is component is operating abnormally, then monitoring system issues report
It warns and notifies registration and authorization server.
3, equipment safety upgrades
When and new version occur when, monitoring system to device send upgrading message.
Device sends current grant information, Current software digest value, configuration etc. according to monitoring system, these all pass through
Rsa encryption.
Monitoring system is requested the device information to registration and authorization server, is tested to the certificate of CA server request unit
Demonstrate,prove whether it can upgrade.If cannot upgrade, registration and authorization server are notified, and record in the local database.Such as
Fruit can upgrade, and will find scalable information according to registration and authorization server and staff.Then according to most current cost,
Decision is online upgrading or offline artificial upgrading.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (6)
1. a kind of method for monitoring credible counting device, which comprises the following steps:
Step 1: security initialization is carried out to credible counting device;
Step 2: monitoring the starting state and operating status of credible counting device in real time;
Step 3: safety upgrade is carried out to credible counting device according to upgrade request;
Wherein, the step 1 specifically includes the following steps:
Step 1.1: distributing credible counting device to user according to user's request;
Step 1.2: receiving the relevant information by encryption that credible counting device is sent, obtained according to relevant information and match confidence
Breath;
Step 1.3: judging whether credible counting device is legal with the configuration information, if so, executing step 2;Otherwise, it sends
Failure information is initialized, is terminated;
The step 2 specifically includes the following steps:
Step 2.1: whether the starting state information by the verifying judgment means to static information is legal, if legal, fills
Starting operation is set, step 2.2 is executed;If not conforming to rule stops starting, terminate;
Step 2.2: the running state information by encryption of credible counting device is obtained at interval of preset time, and it is dynamic to verify it
State memory information;
Step 2.3: information judges whether credible counting device operation is normal according to the operation state, if so, executing step
3;Otherwise, it sends and is operating abnormally alarm, terminate.
2. a kind of method for monitoring credible counting device according to claim 1, which is characterized in that the step 3 is specific
The following steps are included:
Step 3.1: judging whether to receive upgrade request, if so, executing step 3.2;Otherwise, current credible meter is continued to run
Counting apparatus;
Step 3.2: obtaining the relevant information by encryption of credible counting device, current credible counting is judged according to relevant information
Whether device can upgrade, if so, being upgraded, credible counting device after being upgraded, credible counting dress after operation upgrading
It sets;Otherwise, upgrading failure continues to run current credible counting device.
3. a kind of method for monitoring credible counting device according to claim 1 or 2, which is characterized in that the credible meter
The relevant information by encryption that counting apparatus is sent includes device version information, static routine summary info, dynamic memory abstract
One or more of information and configuration excerpt information.
4. a kind of system for monitoring credible counting device, which is characterized in that including initialization module, monitoring module and upgrading mould
Block;
The initialization module is used to carry out security initialization to credible counting device;
The monitoring module is used to monitor in real time the starting state and operating status of credible counting device;
The upgraded module is used to carry out safety upgrade to credible counting device according to upgrade request;
Wherein, the initialization module includes distribution module, configuration module and first judgment module;
The distribution module is used to distribute credible counting device to user according to user's request;
The configuration module is used to receive the relevant information by encryption that credible counting device is sent, and is obtained according to relevant information
Configuration information;
Whether the first judgment module is legal with the configuration information for judging credible counting device, if so, executing reality
When monitor the operating status of credible counting device;Otherwise, initialization failure information is sent, is terminated;
The monitoring module includes starting judgment module, data obtaining module and the second judgment module;
Whether the starting judgment module is used for legal by the starting state information of the verifying judgment means to static information, such as
Fruit is legal, then device starting operation, triggers data obtaining module;If not conforming to rule stops starting;
The operating status by encryption that the data obtaining module is used to obtain credible counting device at interval of preset time is believed
Breath, data obtaining module verify its dynamic memory information;
Second judgment module judges whether credible counting device operation is normal for information according to the operation state, if
It is to continue to run credible counting device, credible counting device is upgraded according to upgrade request;Otherwise, it sends and is operating abnormally
Alarm terminates.
5. a kind of system for monitoring credible counting device according to claim 4, which is characterized in that the upgraded module packet
Include third judgment module and upgrading judging module;
The third judgment module is for judging whether to receive upgrade request, if so, triggering upgrading judging module;Otherwise,
Continue to run current credible counting device;
The upgrading judging module is used to obtain the relevant information by encryption of credible counting device, is judged according to relevant information
Whether current credible counting device can upgrade, if so, being upgraded, credible counting device after being upgraded, operation upgrading
Credible counting device afterwards;Otherwise, upgrading failure continues to run current credible counting device.
6. a kind of system for monitoring credible counting device according to claim 4 or 5, which is characterized in that the credible meter
The relevant information by encryption that counting apparatus is sent includes device version information, static routine summary info, dynamic memory abstract
One or more of information and configuration excerpt information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510738331.XA CN105306301B (en) | 2015-11-03 | 2015-11-03 | A kind of method and system monitoring credible counting device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510738331.XA CN105306301B (en) | 2015-11-03 | 2015-11-03 | A kind of method and system monitoring credible counting device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105306301A CN105306301A (en) | 2016-02-03 |
CN105306301B true CN105306301B (en) | 2019-03-01 |
Family
ID=55203081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510738331.XA Active CN105306301B (en) | 2015-11-03 | 2015-11-03 | A kind of method and system monitoring credible counting device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105306301B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110096887B (en) | 2019-03-22 | 2020-06-30 | 阿里巴巴集团控股有限公司 | Trusted computing method and server |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495979A (en) * | 2011-11-11 | 2012-06-13 | 广州大学 | System for realizing credible counting in digital resource transaction |
CN104714815A (en) * | 2013-12-13 | 2015-06-17 | 乐视网信息技术(北京)股份有限公司 | Method for updating application software and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013048111A2 (en) * | 2011-09-26 | 2013-04-04 | 인텔렉추얼디스커버리 주식회사 | Method and apparatus for detecting an intrusion on a cloud computing service |
-
2015
- 2015-11-03 CN CN201510738331.XA patent/CN105306301B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495979A (en) * | 2011-11-11 | 2012-06-13 | 广州大学 | System for realizing credible counting in digital resource transaction |
CN104714815A (en) * | 2013-12-13 | 2015-06-17 | 乐视网信息技术(北京)股份有限公司 | Method for updating application software and device |
Non-Patent Citations (1)
Title |
---|
《支持运行监控的可信软件体系结构设计方法》;文静等;《计算机学报》;20101231;第33卷(第12期);第3页-第4页 |
Also Published As
Publication number | Publication date |
---|---|
CN105306301A (en) | 2016-02-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103747036B (en) | Trusted security enhancement method in desktop virtualization environment | |
US20180352003A1 (en) | Network Access Control with Compliance Policy Check | |
US9342683B2 (en) | Stateless attestation system | |
CN102438013B (en) | Hardware based credential distribution | |
EP2755162B1 (en) | Identity controlled data center | |
CN105704139B (en) | Streaming media service user authen method based on RTMP agreements | |
CN108111473B (en) | Unified management method, device and system for hybrid cloud | |
CN102158367A (en) | Active anti-plug-in online game system and anti-plug-in method thereof | |
CN113645229B (en) | Authentication system and method based on credible confirmation | |
US9208350B2 (en) | Certificate information verification system | |
CN113094730A (en) | Medical data safety management platform based on internet | |
CN105471903A (en) | Method for generating electronic lock activation information and related system, device and unlocking method | |
CN101296230B (en) | Web service security control mechanism based on PKI and PMI | |
CN115987697B (en) | Multi-level information data sharing method and system based on event subscription mechanism | |
CN114338201B (en) | Data processing method and device, electronic equipment and storage medium | |
CN112581233A (en) | Method, device, equipment and computer-readable storage medium for order offline operation | |
CN106209905A (en) | A kind of network safety managing method and device | |
CN105306301B (en) | A kind of method and system monitoring credible counting device | |
CN113872751B (en) | Method, device and equipment for monitoring service data and storage medium | |
Alboghdady et al. | C'mon: Monitoring the compliance of cloud services to contracted properties | |
CN108200450B (en) | A kind of determination method, apparatus, electronic equipment and medium for paying close attention to legitimacy | |
CN117240625A (en) | Tamper-resistant data processing method and device and electronic equipment | |
CN111641652A (en) | Application security service platform based on cloud computing | |
CN107294945A (en) | Computer program product and authorization code authentication method | |
CN110139163A (en) | A kind of method and relevant apparatus obtaining barrage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |