CN107862207A - Using credible management system and method - Google Patents
Using credible management system and method Download PDFInfo
- Publication number
- CN107862207A CN107862207A CN201711247181.8A CN201711247181A CN107862207A CN 107862207 A CN107862207 A CN 107862207A CN 201711247181 A CN201711247181 A CN 201711247181A CN 107862207 A CN107862207 A CN 107862207A
- Authority
- CN
- China
- Prior art keywords
- application
- submodule
- management system
- credible management
- credible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
It is provided in an embodiment of the present invention to apply credible management system and method, belong to internet of things field.The system is managed by application management module to own application, specifically, is annotated by application definition submodule for being uploaded to each application message using credible management system and the mark of relevant information.Locked by application lock stator modules for the application-specific using in credible management system, avoid deleting or changing by mistake.It will be applied for application provider by application registration submodule and be uploaded to the credible management system of application.Submodule is audited by application, the application using in credible management system audited for keeper, examination & verification is by that can be issued.
Description
Technical field
The present invention relates to internet of things field, in particular to using credible management system and method.
Background technology
Water/electricity/gas/hotlist wireless connection scheme common at present is the addition GPRS/LTE modules in gauge table, is realized
The function being wirelessly transferred using carrier network progress data.As NB-IoT is in the rise of China's commercialization, it is in terminal
Application also can increasingly popularize.But because service and interface that each Virtual network operator provides in NB-IoT networks are different,
Water/electricity/gas/hotlist unit of operation is caused to be restricted when Virtual network operator is changed in the later stage, and to own application
Credible management absence.
The content of the invention
The present invention provides a kind of using credible management system, it is intended to improves above-mentioned technical problem.
It is provided by the invention a kind of using credible management system, including:Application definition submodule, application lock stator modules,
Using registration submodule and application examination & verification submodule;The application definition submodule, for credible for being uploaded to the application
Each application message of management system is annotated and the mark of relevant information;The application lock stator modules, for for described
Locked using the application-specific in credible management system, avoid deleting or changing by mistake;Submodule is registered in the application, for supplying
Application provider, which will apply, is uploaded to the credible management system of application;Submodule is audited in the application, for keeper to institute
State and audited using the application in credible management system, examination & verification is by that can be issued.
Preferably, in addition to:Using submodule is downloaded, submodule is downloaded in the application, for making by default checking
User is downloaded default application.
Preferably, in addition to:Using issue submodule, submodule is issued in the application, for will pass through the application of examination & verification
Issued, so that user is downloaded.
Preferably, in addition to:Using registration submodule, submodule is registered in the application, for supplying the application provider
It will apply and be uploaded to the credible management system of application.
Preferably, in addition to:Using unblock submodule, the application unlocks submodule, for the application of locking to be carried out
Unblock, so that the keeper modifies or managed.
Preferably, in addition to:Application query submodule;The application query submodule, for supplying user or the management
Member it is described using credible management system in search for required application.
Preferably, in addition to submodule is deleted in application;Submodule is deleted in the application, is answered for the keeper described
Delete processing is carried out with the application that preset rules are not met in credible management system.
It is provided by the invention a kind of using credible management method, including:Obtain the application program that supplier is uploaded;Obtain
Trade information and user group's information corresponding to the application program;Obtain examination & verification letter of the keeper to the application program
Breath;After examination & verification passes through, the application program is issued, so that user can be according to self-demand query search intended application
Program, and complete to download.
Preferably, the trade information and user group's information corresponding to the described acquisition application program, is also wrapped afterwards
Include:The trade information and user group's information are labeled.
Preferably, it is described after examination & verification passes through, the application program is issued, so that user can be according to itself need
Query search destination application is sought, and completes to download, is also included before:Judge whether the msu message meets default pass through
Rule.
The credible management system of application and method that the invention described above provides, own application is carried out by application management module
Management, specifically, carried out by application definition submodule for being uploaded to each application message using credible management system
The mark of annotation and relevant information.Entered by application lock stator modules for the application-specific using in credible management system
Row locking, avoids deleting or changing by mistake.Will be credible using the application is uploaded to for application provider by application registration submodule
Management system.Submodule is audited by application, the application using in credible management system audited for keeper,
Examination & verification is by that can be issued.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by embodiment it is required use it is attached
Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as pair
The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this
A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 is the structured flowchart of a kind of electronic equipment provided in an embodiment of the present invention;
Fig. 2 is the high-level schematic functional block diagram using credible management system that first embodiment of the invention provides;
Fig. 3 is the high-level schematic functional block diagram using credible management system that second embodiment of the invention provides;
Fig. 4 is the high-level schematic functional block diagram using credible management system that third embodiment of the invention provides;
Fig. 5 is the flow chart using credible management method that fourth embodiment of the invention provides.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.Therefore,
The detailed description of the embodiments of the invention to providing in the accompanying drawings is not intended to limit the model of claimed invention below
Enclose, but be merely representative of the selected embodiment of the present invention.Based on the embodiment in the present invention, those of ordinary skill in the art are not having
There is the every other embodiment made and obtained under the premise of creative work, belong to the scope of protection of the invention.
As shown in figure 1, the structured flowchart for a kind of electronic equipment provided in an embodiment of the present invention.The electronic equipment 300
Including the credible management system of application, memory 302, storage control 303, processor 304 and Peripheral Interface 305.
The memory 302, storage control 303, processor 304 and 305 each element of Peripheral Interface are direct between each other
Or be electrically connected with indirectly, to realize the transmission of data or interaction.For example, these elements can pass through one or more between each other
Communication bus or signal wire, which are realized, to be electrically connected with.The credible management system of the application include it is at least one can be with software or firmware
(firmware) form is stored in the memory 302 or is solidificated in the operating system of the electronic equipment 300
Software function module in (operating system, OS).The processor 304 is used to perform what is stored in memory 302
Executable module, such as the software function module or computer program included using credible management system.
Wherein, memory 302 may be, but not limited to, random access memory (Random Access Memory,
RAM), read-only storage (Read Only Memory, ROM), programmable read only memory (Programmable Read-
Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory,
EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory,
EEPROM) etc..Wherein, memory 302 is used for storage program, and the processor 304 is after execute instruction is received, described in execution
Program, the method performed by server 100 that the stream process that foregoing any embodiment of the embodiment of the present invention discloses defines can answer
Realized in processor 304, or by processor 304.
Processor 304 is probably a kind of IC chip, has the disposal ability of signal.Above-mentioned processor 304 can
To be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit
(Network Processor, abbreviation NP) etc.;Can also be digital signal processor (DSP), application specific integrated circuit (ASIC),
Ready-made programmable gate array (FPGA) either other PLDs, discrete gate or transistor logic, discrete hard
Part component.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor
Can be microprocessor or the processor can also be any conventional processor etc..
Various input/output devices are coupled to processor 304 and memory 302 by the Peripheral Interface 305.At some
In embodiment, Peripheral Interface 305, processor 304 and storage control 303 can be realized in one single chip.Other one
In a little examples, they can be realized by independent chip respectively.
Fig. 2 is refer to, is the high-level schematic functional block diagram using credible management system that first embodiment of the invention provides.Institute
State includes using credible management system 100:Application definition submodule 111, application lock stator modules 112, using registration submodule
113 and application examination & verification submodule 114.
The application definition submodule 111, for for being uploaded to each application message using credible management system
Annotated and the mark of relevant information.
The application lock stator modules 112, for being locked for the application-specific using in credible management system
It is fixed, avoid deleting or changing by mistake.
Submodule 113 is registered in the application, and the credible management system of the application is uploaded to for that will be applied for application provider
System.
Submodule 114 is audited in the application, and the application using in credible management system is examined for keeper
Core, examination & verification is by that can be issued.
In the present embodiment, application provider's management module 120 is used to be managed third-party application.Wherein,
The third-party application refers to such as ammeter, gas meter or the application program that water meter operator provides.
In the present embodiment, by it is described using credible management system 100 can water/electricity/gas/hotlist production or
Using unit, respective application can be uploaded to by way of trusted service using credible management system 100 and carry out pipe
Reason, the application interface provided using credible management system 100 can also be provided, use related service.And it can to answer
To be applied with supplier and be uploaded to the credible management system 100 of the application and registered, to the industry of application, user group,
The information such as characteristic are labeled, as it is described using credible management system 100 corresponding to keeper to the institute of application vendor
The application of upload is audited, and the application is issued after the completion of examination & verification so that user can inquire about according to self-demand and search
Rope related application, and complete the download to the application.
Fig. 3 is refer to, is the high-level schematic functional block diagram using credible management system that second embodiment of the invention provides.Institute
State includes using credible management system 200:Application definition submodule 211, application lock stator modules 212, using registration submodule
213rd, submodule 215 is downloaded using examination & verification submodule 214 and application.
The application definition submodule 211, for for being uploaded to each application message using credible management system
Annotated and the mark of relevant information.
The application lock stator modules 212, for being locked for the application-specific using in credible management system
It is fixed, avoid deleting or changing by mistake.
Submodule 213 is registered in the application, and the credible management system of the application is uploaded to for that will be applied for application provider
System.
Submodule 214 is audited in the application, and the application using in credible management system is examined for keeper
Core, examination & verification is by that can be issued.
Submodule 215 is downloaded in the application, for making the user by default checking be downloaded default application.
Fig. 4 is refer to, is the high-level schematic functional block diagram using credible management system that third embodiment of the invention provides.Institute
State includes using credible management system 300:Application definition submodule 311, application lock stator modules 312, using registration submodule
313rd, using examination & verification submodule 314, using download submodule 315, using issue submodule 316, using registration submodule 317,
Submodule 328 is deleted using unblock submodule 318, application query submodule 319 and application.
The application definition submodule 311, for for being uploaded to each application message using credible management system
Annotated and the mark of relevant information.
The application lock stator modules 312, for being locked for the application-specific using in credible management system
It is fixed, avoid deleting or changing by mistake.
Submodule 313 is registered in the application, and the credible management system of the application is uploaded to for that will be applied for application provider
System.
Submodule 314 is audited in the application, and the application using in credible management system is examined for keeper
Core, examination & verification is by that can be issued.
Submodule 315 is downloaded in the application, for making the user by default checking be downloaded default application.
Submodule 316 is issued in the application, for will be issued by the application of examination & verification, so that user is downloaded.
Submodule 317 is registered in the application, for will be applied for the application provider be uploaded to the application can fuse tube
Reason system.
The application unlocks submodule 318, for the application of locking to be unlocked, so that the keeper modifies
Or management.
The application query submodule 319, for supplying user or the keeper in the credible management system of application
Application needed for search.
Submodule 328 is deleted in the application, pre- to not met in the credible management system of application for the keeper
If the application of rule carries out delete processing.
Fig. 5 is refer to, is the flow chart using credible management method that fourth embodiment of the invention provides.Below will be to figure
Idiographic flow shown in 5 is described in detail.
Step S101, obtain the application program that supplier is uploaded.
Wherein, the supplier refers to that gas meter, ammeter or water meter etc. run user.
In the present embodiment, before step S101, in addition to, obtain the log-on message of supplier.After only registering
Supplier could upload application program.
Step S102, obtain trade information and user group's information corresponding to the application program.
Wherein, trade information refers to the category of employment information belonging to the application program.User group's information refers to
The targeted class of subscriber of the application program.
In the present embodiment, the application program also carries other information, for example, the characteristic letter of the application program
Breath.Here, it is not especially limited.
Step S103, the trade information and user group's information are labeled.
Step S104, obtain msu message of the keeper to the application program.
Wherein, the msu message refers to that keeper is for auditing the application program by what input equipment was inputted
The no information passed through.
The keeper refers to the user for the credible management system of pipeline application.
Step S105, judge whether the msu message meets to preset and pass through rule.
, can be by judging the keyword for whether having " passing through " printed words in the msu message as a kind of embodiment
To judge whether to meet to preset to pass through rule.It can also carry out judging whether the msu message meets by Boolean expression
It is default to pass through rule, for example, default settings represent to pass through, table when being 0 when the Boolean corresponding to the msu message is 1
Show not by can then be judged by the Boolean corresponding to the msu message.
Step S106, after examination & verification passes through, the application program is issued, so that user can look into according to self-demand
Search destination application is ask, and completes to download.
In summary, the credible management system of application provided by the invention and method, answered by application management module own
With being managed, specifically, by application definition submodule for being uploaded to each application letter using credible management system
Breath is annotated and the mark of relevant information.By application lock stator modules for described using specific in credible management system
Using being locked, avoid deleting or changing by mistake.Described answer is uploaded to by that will be applied for application provider using registration submodule
With credible management system.Submodule is audited by application, the application using in credible management system entered for keeper
Row examination & verification, examination & verification is by that can be issued.
In several embodiments provided herein, it should be understood that disclosed system and method, can also pass through
Other modes are realized.System embodiment described above is only schematical, for example, flow chart and block diagram in accompanying drawing
Show the system of multiple embodiments according to the present invention, method and computer program product architectural framework in the cards,
Function and operation.At this point, each square frame in flow chart or block diagram can represent the one of a module, program segment or code
Part, a part for the module, program segment or code include one or more and are used to realize holding for defined logic function
Row instruction.It should also be noted that at some as in the implementation replaced, the function that is marked in square frame can also with different from
The order marked in accompanying drawing occurs.For example, two continuous square frames can essentially perform substantially in parallel, they are sometimes
It can perform in the opposite order, this is depending on involved function.It is it is also noted that every in block diagram and/or flow chart
The combination of individual square frame and block diagram and/or the square frame in flow chart, function or the special base of action as defined in performing can be used
Realize, or can be realized with the combination of specialized hardware and computer instruction in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate to form an independent portion
Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is used as independent production marketing or in use, can be with
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be
People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention.
And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access
Memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.Need
It is noted that herein, such as first and second or the like relational terms are used merely to an entity or operation
Made a distinction with another entity or operation, and not necessarily require or imply these entities or exist between operating any this
Actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, article or equipment including a series of elements not only include those key elements, but also wrapping
Include the other element being not expressly set out, or also include for this process, method, article or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Other identical element also be present in the process of element, method, article or equipment.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should be included in the scope of the protection.It should be noted that:Similar label and letter exists
Similar terms is represented in following accompanying drawing, therefore, once being defined in a certain Xiang Yi accompanying drawing, is then not required in subsequent accompanying drawing
It is further defined and explained.
Claims (10)
1. one kind applies credible management system, it is characterised in that including:Application definition submodule, application lock stator modules, application
Register submodule and application examination & verification submodule;
The application definition submodule, for described being annotated for being uploaded to using each application message of credible management system
And the mark of relevant information;
The application lock stator modules, for being locked for the application-specific using in credible management system, avoid
Delete or change by mistake;
Submodule is registered in the application, and the credible management system of application is uploaded to for that will be applied for application provider;
Submodule is audited in the application, and the application using in credible management system is audited for keeper, is audited
By that can be issued.
2. system according to claim 1, it is characterised in that also include:Using download submodule, carrier under the application
Module, for making the user by default checking be downloaded default application.
3. system according to claim 1, it is characterised in that also include:Using issue submodule, application issue
Module, for will be issued by the application of examination & verification, so that user is downloaded.
4. system according to claim 1, it is characterised in that also include:Using registration submodule, application registration
Module, the credible management system of application is uploaded to for that will be applied for the application provider.
5. system according to claim 1, it is characterised in that also include:Using unblock submodule, application unblock
Module, for the application of locking to be unlocked, so that the keeper modifies or managed.
6. system according to claim 1, it is characterised in that also include:Application query submodule;
The application query submodule, needed for being searched for for user or the keeper in the credible management system of application
Application.
7. system according to claim 1, it is characterised in that also include application and delete submodule;Son is deleted in the application
Module, delete processing is carried out using the application that preset rules are not met in credible management system to described for the keeper.
8. one kind applies credible management method, it is characterised in that including:
Obtain the application program that supplier is uploaded;
Obtain the trade information and user group's information corresponding to the application program;
Obtain msu message of the keeper to the application program;
After examination & verification passes through, the application program is issued, so that user can answer according to self-demand query search target
With program, and complete to download.
9. according to the method for claim 8, it is characterised in that the industry letter corresponding to the described acquisition application program
Breath and user group's information, also include afterwards:
The trade information and user group's information are labeled.
10. according to the method for claim 8, it is characterised in that it is described after examination & verification passes through, the application program is entered
Row issue, so that user can be according to self-demand query search destination application, and completes to download, also includes before:
Judge whether the msu message meets to preset and pass through rule.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711247181.8A CN107862207A (en) | 2017-12-01 | 2017-12-01 | Using credible management system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711247181.8A CN107862207A (en) | 2017-12-01 | 2017-12-01 | Using credible management system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107862207A true CN107862207A (en) | 2018-03-30 |
Family
ID=61704483
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711247181.8A Pending CN107862207A (en) | 2017-12-01 | 2017-12-01 | Using credible management system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107862207A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113282303A (en) * | 2021-04-27 | 2021-08-20 | 南方电网数字电网研究院有限公司 | Application management method and device based on double-core intelligent electric meter and computer equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102437998A (en) * | 2010-09-29 | 2012-05-02 | 中兴通讯股份有限公司 | Application store system and method by utilizing same to develop |
CN102457504A (en) * | 2010-10-28 | 2012-05-16 | 中兴通讯股份有限公司 | Application store system and method for carrying out application development by using same |
CN103885779A (en) * | 2014-03-28 | 2014-06-25 | 浪潮软件集团有限公司 | Construction method of finance and tax software application center development platform |
CN104035780A (en) * | 2014-06-26 | 2014-09-10 | 北京京东尚科信息技术有限公司 | Method and device for publishing APK file |
CN104834530A (en) * | 2015-05-27 | 2015-08-12 | 百富计算机技术(深圳)有限公司 | Method for developing POS application program and cloud server |
CN106155489A (en) * | 2016-07-29 | 2016-11-23 | 宇龙计算机通信科技(深圳)有限公司 | The locking means of a kind of desktop application and device |
CN106650430A (en) * | 2016-12-01 | 2017-05-10 | 惠州Tcl移动通信有限公司 | Application state locking control method and system based on mobile terminal |
CN107291321A (en) * | 2016-04-11 | 2017-10-24 | 西安中兴新软件有限责任公司 | A kind of method and apparatus for managing application icon |
-
2017
- 2017-12-01 CN CN201711247181.8A patent/CN107862207A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102437998A (en) * | 2010-09-29 | 2012-05-02 | 中兴通讯股份有限公司 | Application store system and method by utilizing same to develop |
CN102457504A (en) * | 2010-10-28 | 2012-05-16 | 中兴通讯股份有限公司 | Application store system and method for carrying out application development by using same |
CN103885779A (en) * | 2014-03-28 | 2014-06-25 | 浪潮软件集团有限公司 | Construction method of finance and tax software application center development platform |
CN104035780A (en) * | 2014-06-26 | 2014-09-10 | 北京京东尚科信息技术有限公司 | Method and device for publishing APK file |
CN104834530A (en) * | 2015-05-27 | 2015-08-12 | 百富计算机技术(深圳)有限公司 | Method for developing POS application program and cloud server |
CN107291321A (en) * | 2016-04-11 | 2017-10-24 | 西安中兴新软件有限责任公司 | A kind of method and apparatus for managing application icon |
CN106155489A (en) * | 2016-07-29 | 2016-11-23 | 宇龙计算机通信科技(深圳)有限公司 | The locking means of a kind of desktop application and device |
CN106650430A (en) * | 2016-12-01 | 2017-05-10 | 惠州Tcl移动通信有限公司 | Application state locking control method and system based on mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113282303A (en) * | 2021-04-27 | 2021-08-20 | 南方电网数字电网研究院有限公司 | Application management method and device based on double-core intelligent electric meter and computer equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109815284B (en) | Data processing method and device | |
CN104391934B (en) | Data verification method and device | |
US8645906B2 (en) | Method for enforcing change policy based on project state | |
CN107798038B (en) | Data response method and data response equipment | |
CN108460687A (en) | The execution of hardware block chain common recognition operation sequence | |
CN109379326B (en) | XML message rule checking method, equipment and storage medium | |
CN112989348B (en) | Attack detection method, model training method, device, server and storage medium | |
CN107798617A (en) | Insurance business treating method and apparatus | |
US10649881B2 (en) | Determining compliance of software applications to compliance standards based on mapped application capabilities | |
CN107171897A (en) | A kind of interface test method and data-interface test system | |
CN116502273B (en) | Dynamic data desensitization method, device and equipment based on data blood edges | |
CN107888659A (en) | The processing method and system of user's request | |
CN105164691A (en) | Optimizing test data payload selection for testing computer software applications using computer networks | |
CN108009296A (en) | A kind of SQL query method, system and relevant apparatus based on Hbase | |
CN106934011A (en) | A kind of structuring analysis method and device of JSON data | |
CN112817935A (en) | Data processing method, device and equipment based on field type and storage medium | |
CN108459956A (en) | Test report automatic management method, apparatus, equipment and storage medium | |
CN106020858A (en) | Method, terminal and system for downloading and installation of application program | |
CN113435174A (en) | System and method for constructing instrument digital object based on data dictionary | |
CN104767761A (en) | Cloud storage platform access control method and device | |
CN115080574A (en) | Method and device for processing electronic product test data, computer equipment and storage medium | |
CN115292197A (en) | Software testing method and device, electronic equipment and storage medium | |
CN107862207A (en) | Using credible management system and method | |
CN114329090A (en) | Path reference searching method and device, electronic equipment and storage medium | |
CN113282591A (en) | Authority filtering method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 610000 Floor 23, No. 11, Tianfu Software Park, 219 Tianhua Second Road, China (Sichuan) Free Trade Experimental Zone, Chengdu, Sichuan Province Applicant after: Sichuan science and technology Limited by Share Ltd Address before: 610000 floor 23, 11 building C, Tianfu Software Park, 219 Tianhua two road, Chengdu High-tech Zone, Sichuan. Applicant before: SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY CO., LTD. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180330 |
|
RJ01 | Rejection of invention patent application after publication |