CN106095488A - A kind of mobile phone behavioural information collocation method based on cloud template way - Google Patents
A kind of mobile phone behavioural information collocation method based on cloud template way Download PDFInfo
- Publication number
- CN106095488A CN106095488A CN201610380560.3A CN201610380560A CN106095488A CN 106095488 A CN106095488 A CN 106095488A CN 201610380560 A CN201610380560 A CN 201610380560A CN 106095488 A CN106095488 A CN 106095488A
- Authority
- CN
- China
- Prior art keywords
- information
- file
- configuration file
- configuration
- analysis
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of mobile phone behavioural information collocation method based on cloud template way, it is characterised in that comprise the following steps: S1: file analysis, the user behavior information that in Main Analysis mobile phone, system and application produce;S2: configuration file format defines, and facilitates developer to use;The generation of S3: configuration file;S4: configuration file uploads and is loaded in application.Beneficial effects of the present invention is as follows: specific aim configures, and splits configuration file, reduces the volume of configuration file;Download respective profiles according to demand;Multi-platform many application are supported, can provide configuration to multiple application program of PC, mobile device simultaneously, improve development efficiency;Configuration file have employed respective encrypted measure, it is ensured that the security of information;More new configuration file can be carried out according to storage data form, the change of file, repair data scanning can be reached and make mistakes or support the purpose of more application.
Description
Technical field
The present invention relates to field of information security technology, join particularly to a kind of mobile phone behavioural information based on cloud template way
Put method.
Background technology
In the 21 century that informationization develops rapidly, computer technology is maked rapid progress, closely bound up with daily life,
Storage device data is lost and is tended to individual, and even business unit brings endless worry and trouble, is relating to computer number
According in storage work, as in enterprise work, it is immeasurable that business data loses the loss causing, and little Ze Shi company cannot
Carrying out the work, enterprises' loss greatly then may being caused heavy and close down, particularly in informatization enterprise, the electronic bits of data of company is just
Being their lifeblood, if recovering these data can save enterprise, allowing the loss of enterprise be preferably minimized;As at electronic evidence-collecting neck
Territory, perhaps these data are exactly the electronic evidence of case, if reviewer can obtain the data in more multicomputer, then
Just advantageously in the detection early of case, it is also possible to provide more reliable evidence to court;This is to evidence obtaining, particularly several
Have higher requirement according to resuming work.
Current electronic evidence-collecting mainly uses manual analysis and software intellectual analysis two ways.Due to electronic equipment on the market
And software is numerous, manual analysis just seems and takes time and effort very much, be only practically applicable to interim analysis mode by this way;And it is soft
Although part intellectual analysis starts to be also required to manual analysis obtains useful information, but this is once and for all, only need to analyze and is once
A kind of configuration file of Software Create is just.
In informationalized today, electronic evidence-collecting increasingly comes into one's own, and each judicial authority also begins to customize various evidence obtaining
Software.Evidence obtaining software on the market is the mode using built-in configuration file or the code that writes direct mostly at present, more this
Mode not only makes configuration file be completely exposed easily stolen by lawless person or competition industry, and not interests software maintenance and
Update.
Content of the invention
The present invention is directed to the defect of prior art, provide a kind of mobile phone behavioural information configuration side based on cloud template way
Method, can effectively solve the problem that the problem that above-mentioned prior art exists.
A kind of mobile phone behavioural information collocation method based on cloud template way, comprises the following steps:
S1: file analysis, in Main Analysis mobile phone system and application produce positional information, chat message, shopping information,
Browse the user behavior information such as information;
S2: configuration file format defines, and defines a configuration file format, facilitates developer to use;
The generation of S3: configuration file, generates respective profiles according to each behavioural information critical field;
S4: configuration file uploads and is loaded in application.
As preferably, the file analysis in described S1 includes that positional information, chat message, shopping information and the information that browses are divided
Analysis;All may produce positional information due to all application, so need to totally analyze mobile phone.
Position analysis step is as follows:
S11: just slightly analyze;Application data are derived from mobile phone, obtains one by keyword search latitude and longitude information
Rough analysis result, result mainly includes file path and positional information content;
S12: specific aim analysis;It is analyzed according to result lock file, the corresponding keyword of Main Analysis positional information,
Such as longitude and latitude keyword: longitude, latitude, place, time;
S13: Accuracy Analysis;Accuracy Analysis, Main Analysis positional information Production conditions, seat are carried out to the result of S12
Mark system form;
S14: chat message analysis;Analyzing the chat record in social class application, chat record typically leaves in
Databases file or with user account name name file under database file in, can be to these databases
Deposit content to be analyzed, find chat record;
S15: shopping information analysis;Analyze the shopping information in electricity business's class application;
S16: browse information analysis;That analyzes in various browser record browses information.
As preferably, the detailed step of described S2 is as follows:
S21: configuration header;Configuration head is the respective identification of each behavioural information, with one or more 0x09 ending;
S22: configure content-defined;Configuration content is followed successively by file type, Stored Data Type, positional information form, literary composition
Part path, behavioural information respective field composition, with one or more 0x09 segmentation;
S23: configuration behavior information field, as a example by general format, following field is split with one or more 0x09.
As preferably, the detailed step of described S23 is as follows:
S231: longitude and latitude field includes latitude, longitude, place, time;
S232: base station information field includes mcc, mnc, cid, bid, sid, place, time, divides with one or more 0x09
Cut;
S233:wifi information field includes ssid, bssid, password, place, time, with one or more 0x09 segmentation;
S234: chat message field includes contact person, contact person ID, content, content type, chat state, chatting time;
S235: shopping information field includes title, price, time, ship-to, with one or more 0x09 segmentation;
S236: browse information field and include website, title, time, with one or more 0x09 segmentation.
As preferably, the detailed step of described S3 is as follows:
S31: filename uses the MD5 value acquisition of application bag name or system file name or self-defined system file mark, this
The mode of kind can prevent undesirable from obtaining the corresponding configuration information of rival's file name;
S32: file header starts 0x0d0a with 0x496e666f and terminates;Information be followed successively by application bag name or system file name or
Self-defined system file mark, version information, with one or more 0x09 segmentation;
S33: each behavioural information is configured by configuration content according to configuration format, and with 0x0d0a segmentation;
The encryption of S34: configuration file uses multi-enciphering mode, prevents relevant configuration information from revealing.
As preferably, the detailed step of described S4 is as follows:
S41: service end realizes and configuration file uploads;Service end mainly has the work that configuration file filing preserves and distributes
With offer configuration file uploads, judges whether the function that needs update and download.Developer is directly provided by service end
Upload interface to upload or more new configuration file, and when service end produces a table record profile name and updates accordingly
Between;
S42: configuration file loads.
As preferably, the detailed step of described S2 is as follows:
S421: detection running environment obtains all application and part system literary composition present in evidence obtaining the run mobile phone of software
Part;
The MD5 value of S422: acquisition application package name or system file name or system file mark is as configuration filename
Claim;
S423: search configuration file in this locality, judge whether configuration file according to profile name in this locality, as
There is then acquisition filemodetime in fruit;
S424: send the request of download, sends, to server, the request of download, and with profile name, modification time conduct
Parameter;
S425: judge whether to need down loading updating, if the request of downloading does not comprises modification time, directly returns configuration literary composition
Part, otherwise contrasts modification time and uplink time, if uplink time is more than modification time, returns configuration file and covers mobile phone
In file, if less than then not returning;
S426: configuration file is deciphered, and is decrypted configuration file according to respective rule;
S427: resolve configuration file, according to configuration file format rule parsing and use;
S428: delete configuration file, the step for carry out after configuration file makes to be finished, predominantly prevent configuration file
Be stolen, owing to before filename and file content being encrypted, so the step for can not carry out.
Compared with prior art it is an advantage of the current invention that: specific aim configures, and carries out information configuration according to application, to configuration
File is split, and reduces the volume of configuration file;On-demand download, uses the mode of network download configuration information, according to demand
Download respective profiles;Multi-platform many application are supported, can provide configuration to multiple application program of PC, mobile device simultaneously,
Improve development efficiency;Safety, configuration file have employed respective encrypted measure, it is ensured that the security of information, prevents achievement in research
It is stolen;Efficiently, the change according to storage data form, file etc. or increase more new configuration file can be carried out at any time, it is no longer necessary to
Again issue new application program or plug-in unit just can reach repair data scanning and makes mistakes or support the purpose of more application.
Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearer, by the following examples, the present invention is done into
One step describes in detail.
A kind of mobile phone behavioural information collocation method based on cloud template way, comprises the following steps:
S1: file analysis, in Main Analysis mobile phone system and application produce positional information, chat message, shopping information,
Browse the user behavior information such as information;
S2: configuration file format defines, and defines a configuration file format, facilitates developer to use.
The generation of S3: configuration file, generates respective profiles according to each behavioural information critical field.
S4: configuration file uploads and is loaded in application.
File analysis in S1 includes positional information, chat message, shopping information and browses information analysis;Answer due to all
With positional information all may be produced, so mobile phone need to be analyzed totally.
Position analysis step is as follows:
S11: just slightly analyze;Will application data derive from mobile phone, by keyword search latitude and longitude information (such as: lat,
Lon or occurrence " 104. ", " 30. " etc., be as the criterion with local coordinate) obtain a rough analysis result, result is mainly wrapped
Include file path and positional information content;
S12: specific aim analysis;It is analyzed according to result lock file, the corresponding keyword of Main Analysis positional information,
Such as longitude and latitude keyword: longitude, latitude, place, time;
S13: Accuracy Analysis;Accuracy Analysis, Main Analysis positional information Production conditions are carried out to the result of step 2
(repeatedly generating longitude and latitude data, determine data by what kind of step are produced), coordinate format (pick up net at coordinate
The latitude and longitude coordinates of http://www.gpsspg.com/maps.htm input position information of standing, switching input coordinate system form,
When map denotation position is identical with analysis site position, the coordinate format of file record is exactly current coordinate system form, coordinate
It is that form includes Google Maps, Baidu's map, Tengxun's map etc.).
S14: chat message analysis;Analyzing the chat record in social class application, chat record typically leaves in
Databases file or with user account name name file under database file in, can be to these databases
Deposit content to be analyzed, find chat record;
S15: shopping information analysis;Analyze the shopping information in electricity business's class application;
S16: browse information analysis;That analyzes in various browser record browses information.
Shopping information, the deposit position browsing information are all identical with chat message with analysis mode
Above behavior all exists only in corresponding type application, so to this few class application specific aim analyses need to be only
Can.
The detailed step of described S2 is as follows:
S21: configuration header;Configuration head is the respective identification of each behavioural information, with one or more 0x09 ending;
S22: configure content-defined;Configuration content (is only followed successively by file type, Stored Data Type, positional information form
Be present in positional information configuration in), file path, behavioural information respective field composition, with one or more 0x09 segmentation;
S23: configuration behavior information field, as a example by general format, following field is split with one or more 0x09;
S231: longitude and latitude field includes latitude, longitude, place, time;
S232: base station information field (as a example by telecommunications) includes mcc, mnc, cid, bid, sid, place, time, with one
Or multiple 0x09 segmentation;
S233:wifi information field includes ssid, bssid, password, place, time, with one or more 0x09 segmentation;
S234: chat message field includes contact person (group), contact person ID (group ID), content, content type, chat
State, chatting time;
S235: shopping information field includes title, price, time, ship-to, with one or more 0x09 segmentation;
S236: browse information field and include website, title, time, with one or more 0x09 segmentation.
The detailed step of described S3 is as follows:
S31: filename uses the MD5 value acquisition of application bag name or system file name or self-defined system file mark, this
The mode of kind can prevent undesirable from obtaining the corresponding configuration information of rival's file name;
S32: file header starts 0x0d0a with 0x496e666f and terminates.Information be followed successively by application bag name or system file name or
Self-defined system file mark, version information, with one or more 0x09 segmentation;
S33: each behavioural information is configured by configuration content according to configuration format, and with 0x0d0a segmentation;
The encryption of S34: configuration file uses multi-enciphering mode, prevents relevant configuration information from revealing.
The detailed step of described S4 is as follows:
S41: service end realizes and configuration file uploads;Service end mainly has the work that configuration file filing preserves and distributes
With offer configuration file uploads, judges whether the function that needs update and download.Developer is directly provided by service end
Upload interface to upload or more new configuration file, and when service end produces a table record profile name and updates accordingly
Between (uplink time);
S42: configuration file loads.
S421: detection running environment obtains all application and part system literary composition present in evidence obtaining the run mobile phone of software
Part;
The MD5 value of S422: acquisition application package name or system file name or system file mark is as configuration filename
Claim;
S423: search configuration file in this locality, judge whether configuration file according to profile name in this locality, as
There is then acquisition filemodetime in fruit;
S424: send the request of download, sends, to server, the request of download, and with profile name, modification time conduct
Parameter
S425: judge whether to need down loading updating, if the request of downloading does not comprises modification time, directly returns configuration literary composition
Part, otherwise contrasts modification time and uplink time, if uplink time is more than modification time, returns configuration file and covers mobile phone
In file, if less than then not returning;
S426: configuration file is deciphered, and is decrypted configuration file according to respective rule;
S427: resolve configuration file, according to configuration file format rule parsing and use;
S428: delete configuration file, the step for carry out after configuration file makes to be finished, predominantly prevent configuration file
Be stolen, owing to before filename and file content being encrypted, so the step for can not carry out.
Those of ordinary skill in the art it will be appreciated that embodiment described here be to aid in reader understanding this
Bright implementation, it should be understood that protection scope of the present invention is not limited to such special statement and embodiment.Ability
The those of ordinary skill in territory can enlighten according to these technology disclosed by the invention makes various its without departing from essence of the present invention
Its various concrete deformation and combination, these deformation and combination are still within the scope of the present invention.
Claims (7)
1. the mobile phone behavioural information collocation method based on cloud template way, it is characterised in that comprise the following steps:
S1: file analysis, in Main Analysis mobile phone system and application produce positional information, chat message, shopping information, browse
The user behavior information such as information;
S2: configuration file format defines, and defines a configuration file format, facilitates developer to use;
The generation of S3: configuration file, generates respective profiles according to each behavioural information critical field;
S4: configuration file uploads and is loaded in application.
2. a kind of mobile phone behavioural information collocation method based on cloud template way according to claim 1, it is characterised in that:
File analysis in described S1 includes positional information, chat message, shopping information and browses information analysis;Due to all application all
Positional information may be produced, so need to totally analyze mobile phone.
Position analysis step is as follows:
S11: just slightly analyze;Application data are derived from mobile phone, obtains one roughly by keyword search latitude and longitude information
Analysis result, result mainly includes file path and positional information content;
S12: specific aim analysis;Being analyzed according to result lock file, the corresponding keyword of Main Analysis positional information, such as warp
Latitude keyword: longitude, latitude, place, time;
S13: Accuracy Analysis;Accuracy Analysis, Main Analysis positional information Production conditions, coordinate system are carried out to the result of S12
Form;
S14: chat message analysis;Analyzing the chat record in social class application, chat record typically leaves databases literary composition in
Part presss from both sides or, in the database file under the file of user account name name, can deposit content to these databases and to carry out
Analyze, find chat record;
S15: shopping information analysis;Analyze the shopping information in electricity business's class application;
S16: browse information analysis;That analyzes in various browser record browses information.
3. a kind of mobile phone behavioural information collocation method based on cloud template way according to claim 2, it is characterised in that
The detailed step of described S2 is as follows:
S21: configuration header;Configuration head is the respective identification of each behavioural information, with one or more 0x09 ending;
S22: configure content-defined;Configuration content is followed successively by file type, Stored Data Type, positional information form, file road
Footpath, behavioural information respective field composition, with one or more 0x09 segmentation;
S23: configuration behavior information field, as a example by general format, following field is split with one or more 0x09.
4. a kind of mobile phone behavioural information collocation method based on cloud template way according to claim 3, it is characterised in that
The detailed step of described S23 is as follows:
S231: longitude and latitude field includes latitude, longitude, place, time;
S232: base station information field includes mcc, mnc, cid, bid, sid, place, time, with one or more 0x09 segmentation;
S233:wifi information field includes ssid, bssid, password, place, time, with one or more 0x09 segmentation;
S234: chat message field includes contact person, contact person ID, content, content type, chat state, chatting time;
S235: shopping information field includes title, price, time, ship-to, with one or more 0x09 segmentation;
S236: browse information field and include website, title, time, with one or more 0x09 segmentation.
5. a kind of mobile phone behavioural information collocation method based on cloud template way according to claim 4, it is characterised in that
The detailed step of described S3 is as follows:
S31: filename uses the MD5 value acquisition of application bag name or system file name or self-defined system file mark, this side
Formula can prevent undesirable from obtaining the corresponding configuration information of rival's file name;
S32: file header starts 0x0d0a with 0x496e666f and terminates;Information is followed successively by application bag name or system file name or makes by oneself
Justice system file mark, version information, with one or more 0x09 segmentation;
S33: each behavioural information is configured by configuration content according to configuration format, and with 0x0d0a segmentation;
The encryption of S34: configuration file uses multi-enciphering mode, prevents relevant configuration information from revealing.
6. a kind of mobile phone behavioural information collocation method based on cloud template way according to claim 5, it is characterised in that
The detailed step of described S4 is as follows:
S41: service end realizes and configuration file uploads;Service end mainly plays the role of configuration file filing and preserves and distribution,
There is provided configuration file to upload, judge whether the function that needs update and download.Developer directly by service end provide upper
Pass interface to upload or more new configuration file, and when service end produces a table record profile name and updates accordingly
Between;
S42: configuration file loads.
7. a kind of mobile phone behavioural information collocation method based on cloud template way according to claim 6, it is characterised in that
The detailed step of described S2 is as follows:
S421: detection running environment obtains all application and part system file present in evidence obtaining the run mobile phone of software;
The MD5 value of S422: acquisition application package name or system file name or system file mark is as profile name;
S423: searching configuration file in this locality, judging whether configuration file according to profile name in this locality, if deposited
Then obtaining filemodetime;
S424: send the request of download, sends, to server, the request of download, and with profile name, modification time as parameter;
S425: judge whether to need down loading updating, if the request of downloading does not comprises modification time, directly returns configuration file, no
Then contrast modification time and uplink time, if uplink time is more than modification time, returns configuration file and cover the literary composition in mobile phone
Part, if less than then not returning;
S426: configuration file is deciphered, and is decrypted configuration file according to respective rule;
S427: resolve configuration file, according to configuration file format rule parsing and use;
S428: delete configuration file, the step for carry out after configuration file makes to be finished, predominantly prevent configuration file stolen
Take, owing to before filename and file content being encrypted, so the step for can not carry out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610380560.3A CN106095488A (en) | 2016-05-31 | 2016-05-31 | A kind of mobile phone behavioural information collocation method based on cloud template way |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610380560.3A CN106095488A (en) | 2016-05-31 | 2016-05-31 | A kind of mobile phone behavioural information collocation method based on cloud template way |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106095488A true CN106095488A (en) | 2016-11-09 |
Family
ID=57229916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610380560.3A Pending CN106095488A (en) | 2016-05-31 | 2016-05-31 | A kind of mobile phone behavioural information collocation method based on cloud template way |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106095488A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110138750A (en) * | 2019-04-23 | 2019-08-16 | 上海数据交易中心有限公司 | Encryption method, apparatus and system, storage medium, the terminal of configuration file |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7457853B1 (en) * | 2003-07-03 | 2008-11-25 | Cisco Technology, Inc. | Method and apparatus for automatically configuring a network device |
CN103838596A (en) * | 2012-11-26 | 2014-06-04 | 中国银联股份有限公司 | Formatted file generation system, device and method for data processing |
CN103927494A (en) * | 2014-03-24 | 2014-07-16 | 浙江浙大网新集团有限公司 | Method and system for managing security configuration files |
CN104111826A (en) * | 2013-04-19 | 2014-10-22 | 杭州新世纪电子科技有限公司 | Software project development method and device |
CN104598263A (en) * | 2014-12-04 | 2015-05-06 | 广州酷狗计算机科技有限公司 | Application program operation method and configuration file generating method and device |
CN104951515A (en) * | 2015-05-29 | 2015-09-30 | 四川效率源信息安全技术有限责任公司 | Method for extracting and analyzing Android mobile phone track |
CN105426417A (en) * | 2015-11-02 | 2016-03-23 | 四川效率源信息安全技术股份有限公司 | Method for quickly looking up geographic position information in smartphone |
-
2016
- 2016-05-31 CN CN201610380560.3A patent/CN106095488A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7457853B1 (en) * | 2003-07-03 | 2008-11-25 | Cisco Technology, Inc. | Method and apparatus for automatically configuring a network device |
CN103838596A (en) * | 2012-11-26 | 2014-06-04 | 中国银联股份有限公司 | Formatted file generation system, device and method for data processing |
CN104111826A (en) * | 2013-04-19 | 2014-10-22 | 杭州新世纪电子科技有限公司 | Software project development method and device |
CN103927494A (en) * | 2014-03-24 | 2014-07-16 | 浙江浙大网新集团有限公司 | Method and system for managing security configuration files |
CN104598263A (en) * | 2014-12-04 | 2015-05-06 | 广州酷狗计算机科技有限公司 | Application program operation method and configuration file generating method and device |
CN104951515A (en) * | 2015-05-29 | 2015-09-30 | 四川效率源信息安全技术有限责任公司 | Method for extracting and analyzing Android mobile phone track |
CN105426417A (en) * | 2015-11-02 | 2016-03-23 | 四川效率源信息安全技术股份有限公司 | Method for quickly looking up geographic position information in smartphone |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110138750A (en) * | 2019-04-23 | 2019-08-16 | 上海数据交易中心有限公司 | Encryption method, apparatus and system, storage medium, the terminal of configuration file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103488528B (en) | A kind of Quick Response Code processing method and processing device based on mobile terminal | |
US10997788B2 (en) | Context-aware tagging for augmented reality environments | |
CN109829726B (en) | Block chain-based drug information management method and system | |
CN104933363B (en) | The method and apparatus for detecting malicious file | |
CN105162894B (en) | Device identification acquisition methods and device | |
WO2014032419A1 (en) | Method and system for obtaining consultation information based on picture | |
CN104462285A (en) | Privacy protection method for mobile service inquiry system | |
CN108491715B (en) | Terminal fingerprint database generation method and device and server | |
CN104243532A (en) | Data access method and system | |
CN110851359A (en) | Application program testing method and device and server | |
CN108052553A (en) | Method, apparatus, computer equipment and the storage medium of electronic documentation generation | |
US9665732B2 (en) | Secure Download from internet marketplace | |
KR20170130538A (en) | Business anchoring using geolocated images | |
CN111782719A (en) | Data processing method and device | |
CN104580300B (en) | The method and system of figure and outdoor scene identification based on cloud operation | |
CN104516948B (en) | A kind of positional information extracting method and device based on mass data | |
CN112241298A (en) | Page display method and device, storage medium and electronic device | |
CN104980409A (en) | Internet behavior management method and device | |
CN104184773B (en) | A kind of data download method and system | |
CN106095488A (en) | A kind of mobile phone behavioural information collocation method based on cloud template way | |
CN108134811A (en) | The methods, devices and systems that file destination is distributed or downloaded | |
CN112529102A (en) | Feature expansion method, device, medium, and computer program product | |
KR20120079918A (en) | Learning services providing method and system | |
CN104168362A (en) | Terminal, two-dimensional management apparatus, and electronic card management method | |
CN108268545B (en) | Method and device for establishing hierarchical user label library |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: No. 183 Songshan Road, Neijiang, Sichuan, Sichuan Applicant after: Sichuan Miwu Traceless Science and Technology Co.,Ltd. Address before: No. 183 Songshan Road, Neijiang, Sichuan, Sichuan Applicant before: SICHUAN MWH INFORMATION SECURITY TECHNOLOGY Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161109 |