CN107862207A - Using credible management system and method - Google Patents

Using credible management system and method Download PDF

Info

Publication number
CN107862207A
CN107862207A CN201711247181.8A CN201711247181A CN107862207A CN 107862207 A CN107862207 A CN 107862207A CN 201711247181 A CN201711247181 A CN 201711247181A CN 107862207 A CN107862207 A CN 107862207A
Authority
CN
China
Prior art keywords
application
submodule
management system
credible management
credible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711247181.8A
Other languages
Chinese (zh)
Inventor
杜平
崔云峰
朱琳琳
潘彬
刘正寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY Co Ltd
Original Assignee
SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY Co Ltd filed Critical SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY Co Ltd
Priority to CN201711247181.8A priority Critical patent/CN107862207A/en
Publication of CN107862207A publication Critical patent/CN107862207A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

It is provided in an embodiment of the present invention to apply credible management system and method, belong to internet of things field.The system is managed by application management module to own application, specifically, is annotated by application definition submodule for being uploaded to each application message using credible management system and the mark of relevant information.Locked by application lock stator modules for the application-specific using in credible management system, avoid deleting or changing by mistake.It will be applied for application provider by application registration submodule and be uploaded to the credible management system of application.Submodule is audited by application, the application using in credible management system audited for keeper, examination & verification is by that can be issued.

Description

Using credible management system and method
Technical field
The present invention relates to internet of things field, in particular to using credible management system and method.
Background technology
Water/electricity/gas/hotlist wireless connection scheme common at present is the addition GPRS/LTE modules in gauge table, is realized The function being wirelessly transferred using carrier network progress data.As NB-IoT is in the rise of China's commercialization, it is in terminal Application also can increasingly popularize.But because service and interface that each Virtual network operator provides in NB-IoT networks are different, Water/electricity/gas/hotlist unit of operation is caused to be restricted when Virtual network operator is changed in the later stage, and to own application Credible management absence.
The content of the invention
The present invention provides a kind of using credible management system, it is intended to improves above-mentioned technical problem.
It is provided by the invention a kind of using credible management system, including:Application definition submodule, application lock stator modules, Using registration submodule and application examination & verification submodule;The application definition submodule, for credible for being uploaded to the application Each application message of management system is annotated and the mark of relevant information;The application lock stator modules, for for described Locked using the application-specific in credible management system, avoid deleting or changing by mistake;Submodule is registered in the application, for supplying Application provider, which will apply, is uploaded to the credible management system of application;Submodule is audited in the application, for keeper to institute State and audited using the application in credible management system, examination & verification is by that can be issued.
Preferably, in addition to:Using submodule is downloaded, submodule is downloaded in the application, for making by default checking User is downloaded default application.
Preferably, in addition to:Using issue submodule, submodule is issued in the application, for will pass through the application of examination & verification Issued, so that user is downloaded.
Preferably, in addition to:Using registration submodule, submodule is registered in the application, for supplying the application provider It will apply and be uploaded to the credible management system of application.
Preferably, in addition to:Using unblock submodule, the application unlocks submodule, for the application of locking to be carried out Unblock, so that the keeper modifies or managed.
Preferably, in addition to:Application query submodule;The application query submodule, for supplying user or the management Member it is described using credible management system in search for required application.
Preferably, in addition to submodule is deleted in application;Submodule is deleted in the application, is answered for the keeper described Delete processing is carried out with the application that preset rules are not met in credible management system.
It is provided by the invention a kind of using credible management method, including:Obtain the application program that supplier is uploaded;Obtain Trade information and user group's information corresponding to the application program;Obtain examination & verification letter of the keeper to the application program Breath;After examination & verification passes through, the application program is issued, so that user can be according to self-demand query search intended application Program, and complete to download.
Preferably, the trade information and user group's information corresponding to the described acquisition application program, is also wrapped afterwards Include:The trade information and user group's information are labeled.
Preferably, it is described after examination & verification passes through, the application program is issued, so that user can be according to itself need Query search destination application is sought, and completes to download, is also included before:Judge whether the msu message meets default pass through Rule.
The credible management system of application and method that the invention described above provides, own application is carried out by application management module Management, specifically, carried out by application definition submodule for being uploaded to each application message using credible management system The mark of annotation and relevant information.Entered by application lock stator modules for the application-specific using in credible management system Row locking, avoids deleting or changing by mistake.Will be credible using the application is uploaded to for application provider by application registration submodule Management system.Submodule is audited by application, the application using in credible management system audited for keeper, Examination & verification is by that can be issued.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by embodiment it is required use it is attached Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as pair The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 is the structured flowchart of a kind of electronic equipment provided in an embodiment of the present invention;
Fig. 2 is the high-level schematic functional block diagram using credible management system that first embodiment of the invention provides;
Fig. 3 is the high-level schematic functional block diagram using credible management system that second embodiment of the invention provides;
Fig. 4 is the high-level schematic functional block diagram using credible management system that third embodiment of the invention provides;
Fig. 5 is the flow chart using credible management method that fourth embodiment of the invention provides.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.Therefore, The detailed description of the embodiments of the invention to providing in the accompanying drawings is not intended to limit the model of claimed invention below Enclose, but be merely representative of the selected embodiment of the present invention.Based on the embodiment in the present invention, those of ordinary skill in the art are not having There is the every other embodiment made and obtained under the premise of creative work, belong to the scope of protection of the invention.
As shown in figure 1, the structured flowchart for a kind of electronic equipment provided in an embodiment of the present invention.The electronic equipment 300 Including the credible management system of application, memory 302, storage control 303, processor 304 and Peripheral Interface 305.
The memory 302, storage control 303, processor 304 and 305 each element of Peripheral Interface are direct between each other Or be electrically connected with indirectly, to realize the transmission of data or interaction.For example, these elements can pass through one or more between each other Communication bus or signal wire, which are realized, to be electrically connected with.The credible management system of the application include it is at least one can be with software or firmware (firmware) form is stored in the memory 302 or is solidificated in the operating system of the electronic equipment 300 Software function module in (operating system, OS).The processor 304 is used to perform what is stored in memory 302 Executable module, such as the software function module or computer program included using credible management system.
Wherein, memory 302 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only storage (Read Only Memory, ROM), programmable read only memory (Programmable Read- Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 302 is used for storage program, and the processor 304 is after execute instruction is received, described in execution Program, the method performed by server 100 that the stream process that foregoing any embodiment of the embodiment of the present invention discloses defines can answer Realized in processor 304, or by processor 304.
Processor 304 is probably a kind of IC chip, has the disposal ability of signal.Above-mentioned processor 304 can To be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit (Network Processor, abbreviation NP) etc.;Can also be digital signal processor (DSP), application specific integrated circuit (ASIC), Ready-made programmable gate array (FPGA) either other PLDs, discrete gate or transistor logic, discrete hard Part component.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor Can be microprocessor or the processor can also be any conventional processor etc..
Various input/output devices are coupled to processor 304 and memory 302 by the Peripheral Interface 305.At some In embodiment, Peripheral Interface 305, processor 304 and storage control 303 can be realized in one single chip.Other one In a little examples, they can be realized by independent chip respectively.
Fig. 2 is refer to, is the high-level schematic functional block diagram using credible management system that first embodiment of the invention provides.Institute State includes using credible management system 100:Application definition submodule 111, application lock stator modules 112, using registration submodule 113 and application examination & verification submodule 114.
The application definition submodule 111, for for being uploaded to each application message using credible management system Annotated and the mark of relevant information.
The application lock stator modules 112, for being locked for the application-specific using in credible management system It is fixed, avoid deleting or changing by mistake.
Submodule 113 is registered in the application, and the credible management system of the application is uploaded to for that will be applied for application provider System.
Submodule 114 is audited in the application, and the application using in credible management system is examined for keeper Core, examination & verification is by that can be issued.
In the present embodiment, application provider's management module 120 is used to be managed third-party application.Wherein, The third-party application refers to such as ammeter, gas meter or the application program that water meter operator provides.
In the present embodiment, by it is described using credible management system 100 can water/electricity/gas/hotlist production or Using unit, respective application can be uploaded to by way of trusted service using credible management system 100 and carry out pipe Reason, the application interface provided using credible management system 100 can also be provided, use related service.And it can to answer To be applied with supplier and be uploaded to the credible management system 100 of the application and registered, to the industry of application, user group, The information such as characteristic are labeled, as it is described using credible management system 100 corresponding to keeper to the institute of application vendor The application of upload is audited, and the application is issued after the completion of examination & verification so that user can inquire about according to self-demand and search Rope related application, and complete the download to the application.
Fig. 3 is refer to, is the high-level schematic functional block diagram using credible management system that second embodiment of the invention provides.Institute State includes using credible management system 200:Application definition submodule 211, application lock stator modules 212, using registration submodule 213rd, submodule 215 is downloaded using examination & verification submodule 214 and application.
The application definition submodule 211, for for being uploaded to each application message using credible management system Annotated and the mark of relevant information.
The application lock stator modules 212, for being locked for the application-specific using in credible management system It is fixed, avoid deleting or changing by mistake.
Submodule 213 is registered in the application, and the credible management system of the application is uploaded to for that will be applied for application provider System.
Submodule 214 is audited in the application, and the application using in credible management system is examined for keeper Core, examination & verification is by that can be issued.
Submodule 215 is downloaded in the application, for making the user by default checking be downloaded default application.
Fig. 4 is refer to, is the high-level schematic functional block diagram using credible management system that third embodiment of the invention provides.Institute State includes using credible management system 300:Application definition submodule 311, application lock stator modules 312, using registration submodule 313rd, using examination & verification submodule 314, using download submodule 315, using issue submodule 316, using registration submodule 317, Submodule 328 is deleted using unblock submodule 318, application query submodule 319 and application.
The application definition submodule 311, for for being uploaded to each application message using credible management system Annotated and the mark of relevant information.
The application lock stator modules 312, for being locked for the application-specific using in credible management system It is fixed, avoid deleting or changing by mistake.
Submodule 313 is registered in the application, and the credible management system of the application is uploaded to for that will be applied for application provider System.
Submodule 314 is audited in the application, and the application using in credible management system is examined for keeper Core, examination & verification is by that can be issued.
Submodule 315 is downloaded in the application, for making the user by default checking be downloaded default application.
Submodule 316 is issued in the application, for will be issued by the application of examination & verification, so that user is downloaded.
Submodule 317 is registered in the application, for will be applied for the application provider be uploaded to the application can fuse tube Reason system.
The application unlocks submodule 318, for the application of locking to be unlocked, so that the keeper modifies Or management.
The application query submodule 319, for supplying user or the keeper in the credible management system of application Application needed for search.
Submodule 328 is deleted in the application, pre- to not met in the credible management system of application for the keeper If the application of rule carries out delete processing.
Fig. 5 is refer to, is the flow chart using credible management method that fourth embodiment of the invention provides.Below will be to figure Idiographic flow shown in 5 is described in detail.
Step S101, obtain the application program that supplier is uploaded.
Wherein, the supplier refers to that gas meter, ammeter or water meter etc. run user.
In the present embodiment, before step S101, in addition to, obtain the log-on message of supplier.After only registering Supplier could upload application program.
Step S102, obtain trade information and user group's information corresponding to the application program.
Wherein, trade information refers to the category of employment information belonging to the application program.User group's information refers to The targeted class of subscriber of the application program.
In the present embodiment, the application program also carries other information, for example, the characteristic letter of the application program Breath.Here, it is not especially limited.
Step S103, the trade information and user group's information are labeled.
Step S104, obtain msu message of the keeper to the application program.
Wherein, the msu message refers to that keeper is for auditing the application program by what input equipment was inputted The no information passed through.
The keeper refers to the user for the credible management system of pipeline application.
Step S105, judge whether the msu message meets to preset and pass through rule.
, can be by judging the keyword for whether having " passing through " printed words in the msu message as a kind of embodiment To judge whether to meet to preset to pass through rule.It can also carry out judging whether the msu message meets by Boolean expression It is default to pass through rule, for example, default settings represent to pass through, table when being 0 when the Boolean corresponding to the msu message is 1 Show not by can then be judged by the Boolean corresponding to the msu message.
Step S106, after examination & verification passes through, the application program is issued, so that user can look into according to self-demand Search destination application is ask, and completes to download.
In summary, the credible management system of application provided by the invention and method, answered by application management module own With being managed, specifically, by application definition submodule for being uploaded to each application letter using credible management system Breath is annotated and the mark of relevant information.By application lock stator modules for described using specific in credible management system Using being locked, avoid deleting or changing by mistake.Described answer is uploaded to by that will be applied for application provider using registration submodule With credible management system.Submodule is audited by application, the application using in credible management system entered for keeper Row examination & verification, examination & verification is by that can be issued.
In several embodiments provided herein, it should be understood that disclosed system and method, can also pass through Other modes are realized.System embodiment described above is only schematical, for example, flow chart and block diagram in accompanying drawing Show the system of multiple embodiments according to the present invention, method and computer program product architectural framework in the cards, Function and operation.At this point, each square frame in flow chart or block diagram can represent the one of a module, program segment or code Part, a part for the module, program segment or code include one or more and are used to realize holding for defined logic function Row instruction.It should also be noted that at some as in the implementation replaced, the function that is marked in square frame can also with different from The order marked in accompanying drawing occurs.For example, two continuous square frames can essentially perform substantially in parallel, they are sometimes It can perform in the opposite order, this is depending on involved function.It is it is also noted that every in block diagram and/or flow chart The combination of individual square frame and block diagram and/or the square frame in flow chart, function or the special base of action as defined in performing can be used Realize, or can be realized with the combination of specialized hardware and computer instruction in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access Memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.Need It is noted that herein, such as first and second or the like relational terms are used merely to an entity or operation Made a distinction with another entity or operation, and not necessarily require or imply these entities or exist between operating any this Actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, article or equipment including a series of elements not only include those key elements, but also wrapping Include the other element being not expressly set out, or also include for this process, method, article or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Other identical element also be present in the process of element, method, article or equipment.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.It should be noted that:Similar label and letter exists Similar terms is represented in following accompanying drawing, therefore, once being defined in a certain Xiang Yi accompanying drawing, is then not required in subsequent accompanying drawing It is further defined and explained.

Claims (10)

1. one kind applies credible management system, it is characterised in that including:Application definition submodule, application lock stator modules, application Register submodule and application examination & verification submodule;
The application definition submodule, for described being annotated for being uploaded to using each application message of credible management system And the mark of relevant information;
The application lock stator modules, for being locked for the application-specific using in credible management system, avoid Delete or change by mistake;
Submodule is registered in the application, and the credible management system of application is uploaded to for that will be applied for application provider;
Submodule is audited in the application, and the application using in credible management system is audited for keeper, is audited By that can be issued.
2. system according to claim 1, it is characterised in that also include:Using download submodule, carrier under the application Module, for making the user by default checking be downloaded default application.
3. system according to claim 1, it is characterised in that also include:Using issue submodule, application issue Module, for will be issued by the application of examination & verification, so that user is downloaded.
4. system according to claim 1, it is characterised in that also include:Using registration submodule, application registration Module, the credible management system of application is uploaded to for that will be applied for the application provider.
5. system according to claim 1, it is characterised in that also include:Using unblock submodule, application unblock Module, for the application of locking to be unlocked, so that the keeper modifies or managed.
6. system according to claim 1, it is characterised in that also include:Application query submodule;
The application query submodule, needed for being searched for for user or the keeper in the credible management system of application Application.
7. system according to claim 1, it is characterised in that also include application and delete submodule;Son is deleted in the application Module, delete processing is carried out using the application that preset rules are not met in credible management system to described for the keeper.
8. one kind applies credible management method, it is characterised in that including:
Obtain the application program that supplier is uploaded;
Obtain the trade information and user group's information corresponding to the application program;
Obtain msu message of the keeper to the application program;
After examination & verification passes through, the application program is issued, so that user can answer according to self-demand query search target With program, and complete to download.
9. according to the method for claim 8, it is characterised in that the industry letter corresponding to the described acquisition application program Breath and user group's information, also include afterwards:
The trade information and user group's information are labeled.
10. according to the method for claim 8, it is characterised in that it is described after examination & verification passes through, the application program is entered Row issue, so that user can be according to self-demand query search destination application, and completes to download, also includes before:
Judge whether the msu message meets to preset and pass through rule.
CN201711247181.8A 2017-12-01 2017-12-01 Using credible management system and method Pending CN107862207A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711247181.8A CN107862207A (en) 2017-12-01 2017-12-01 Using credible management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711247181.8A CN107862207A (en) 2017-12-01 2017-12-01 Using credible management system and method

Publications (1)

Publication Number Publication Date
CN107862207A true CN107862207A (en) 2018-03-30

Family

ID=61704483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711247181.8A Pending CN107862207A (en) 2017-12-01 2017-12-01 Using credible management system and method

Country Status (1)

Country Link
CN (1) CN107862207A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113282303A (en) * 2021-04-27 2021-08-20 南方电网数字电网研究院有限公司 Application management method and device based on double-core intelligent electric meter and computer equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102437998A (en) * 2010-09-29 2012-05-02 中兴通讯股份有限公司 Application store system and method by utilizing same to develop
CN102457504A (en) * 2010-10-28 2012-05-16 中兴通讯股份有限公司 Application store system and method for carrying out application development by using same
CN103885779A (en) * 2014-03-28 2014-06-25 浪潮软件集团有限公司 Construction method of finance and tax software application center development platform
CN104035780A (en) * 2014-06-26 2014-09-10 北京京东尚科信息技术有限公司 Method and device for publishing APK file
CN104834530A (en) * 2015-05-27 2015-08-12 百富计算机技术(深圳)有限公司 Method for developing POS application program and cloud server
CN106155489A (en) * 2016-07-29 2016-11-23 宇龙计算机通信科技(深圳)有限公司 The locking means of a kind of desktop application and device
CN106650430A (en) * 2016-12-01 2017-05-10 惠州Tcl移动通信有限公司 Application state locking control method and system based on mobile terminal
CN107291321A (en) * 2016-04-11 2017-10-24 西安中兴新软件有限责任公司 A kind of method and apparatus for managing application icon

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102437998A (en) * 2010-09-29 2012-05-02 中兴通讯股份有限公司 Application store system and method by utilizing same to develop
CN102457504A (en) * 2010-10-28 2012-05-16 中兴通讯股份有限公司 Application store system and method for carrying out application development by using same
CN103885779A (en) * 2014-03-28 2014-06-25 浪潮软件集团有限公司 Construction method of finance and tax software application center development platform
CN104035780A (en) * 2014-06-26 2014-09-10 北京京东尚科信息技术有限公司 Method and device for publishing APK file
CN104834530A (en) * 2015-05-27 2015-08-12 百富计算机技术(深圳)有限公司 Method for developing POS application program and cloud server
CN107291321A (en) * 2016-04-11 2017-10-24 西安中兴新软件有限责任公司 A kind of method and apparatus for managing application icon
CN106155489A (en) * 2016-07-29 2016-11-23 宇龙计算机通信科技(深圳)有限公司 The locking means of a kind of desktop application and device
CN106650430A (en) * 2016-12-01 2017-05-10 惠州Tcl移动通信有限公司 Application state locking control method and system based on mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113282303A (en) * 2021-04-27 2021-08-20 南方电网数字电网研究院有限公司 Application management method and device based on double-core intelligent electric meter and computer equipment

Similar Documents

Publication Publication Date Title
CN109815284B (en) Data processing method and device
CN104391934B (en) Data verification method and device
US8645906B2 (en) Method for enforcing change policy based on project state
CN107798038B (en) Data response method and data response equipment
CN108460687A (en) The execution of hardware block chain common recognition operation sequence
CN109379326B (en) XML message rule checking method, equipment and storage medium
CN112989348B (en) Attack detection method, model training method, device, server and storage medium
CN107798617A (en) Insurance business treating method and apparatus
US10649881B2 (en) Determining compliance of software applications to compliance standards based on mapped application capabilities
CN107171897A (en) A kind of interface test method and data-interface test system
CN116502273B (en) Dynamic data desensitization method, device and equipment based on data blood edges
CN107888659A (en) The processing method and system of user's request
CN105164691A (en) Optimizing test data payload selection for testing computer software applications using computer networks
CN108009296A (en) A kind of SQL query method, system and relevant apparatus based on Hbase
CN106934011A (en) A kind of structuring analysis method and device of JSON data
CN112817935A (en) Data processing method, device and equipment based on field type and storage medium
CN108459956A (en) Test report automatic management method, apparatus, equipment and storage medium
CN106020858A (en) Method, terminal and system for downloading and installation of application program
CN113435174A (en) System and method for constructing instrument digital object based on data dictionary
CN104767761A (en) Cloud storage platform access control method and device
CN115080574A (en) Method and device for processing electronic product test data, computer equipment and storage medium
CN115292197A (en) Software testing method and device, electronic equipment and storage medium
CN107862207A (en) Using credible management system and method
CN114329090A (en) Path reference searching method and device, electronic equipment and storage medium
CN113282591A (en) Authority filtering method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 610000 Floor 23, No. 11, Tianfu Software Park, 219 Tianhua Second Road, China (Sichuan) Free Trade Experimental Zone, Chengdu, Sichuan Province

Applicant after: Sichuan science and technology Limited by Share Ltd

Address before: 610000 floor 23, 11 building C, Tianfu Software Park, 219 Tianhua two road, Chengdu High-tech Zone, Sichuan.

Applicant before: SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY CO., LTD.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20180330

RJ01 Rejection of invention patent application after publication