CN107979813A - A kind of trustworthy location operation management method - Google Patents

A kind of trustworthy location operation management method Download PDF

Info

Publication number
CN107979813A
CN107979813A CN201711214443.0A CN201711214443A CN107979813A CN 107979813 A CN107979813 A CN 107979813A CN 201711214443 A CN201711214443 A CN 201711214443A CN 107979813 A CN107979813 A CN 107979813A
Authority
CN
China
Prior art keywords
trustworthy location
trustworthy
location
operation management
management platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711214443.0A
Other languages
Chinese (zh)
Inventor
刘显明
江虹
李彬
鄂驰
陈雪莲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information And Communication Branch Of Jiangxi Electric Power Co Ltd
State Grid Corp of China SGCC
Original Assignee
Information And Communication Branch Of Jiangxi Electric Power Co Ltd
State Grid Corp of China SGCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information And Communication Branch Of Jiangxi Electric Power Co Ltd, State Grid Corp of China SGCC filed Critical Information And Communication Branch Of Jiangxi Electric Power Co Ltd
Priority to CN201711214443.0A priority Critical patent/CN107979813A/en
Publication of CN107979813A publication Critical patent/CN107979813A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0283Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of trustworthy location operation management method, including trustworthy location generating means, trustworthy location operation management platform, trustworthy location use device and trustworthy location user.The trustworthy location generating means of the present invention generate trustworthy location by credible root node of reliable hardware chip, and are supplied to trustworthy location management platform;Trust chain is generated by trustworthy location operation management platform, and externally issues trustworthy location and expenses standard;Trustworthy location use device reads and verifies the trustworthy location of trustworthy location management platform issue;Trustworthy location user obtains trustworthy location by trustworthy location use device.Therefore, the present invention is based on adding trustworthy location on the basis of location-based service technological frame existing, the harm that can come to avoid position camouflage belt, and the operation such as can be valuated, charged to the use of trustworthy location, realizes the safe and effective operation of trustworthy location.

Description

A kind of trustworthy location operation management method
Technical field
The present invention relates to computer realm, more particularly to a kind of trustworthy location operation management method.
Background technology
Location-based service refers to the service for providing object geographical location information, and it is in emergency circumstances rapid fixed to be mainly used for improving in early days The scene of position person for help.A large amount of new applications are generated in mobile Internet evolution, these applications can with terminal It is mobile, can position and the characteristic such as carry with and be combined, provide personalization, the relevant service in position to the user.Current The research field of art circle focuses more on user individual behavior and swarm intelligence etc..With mobile Internet and position The development and fusion of service technology, have had many commercially produced products based on location-based service, for example, vehicle-mounted lead in industrial circle Navigate software and hardware, wechat, phone wrist-watch etc..But the continuous development of position camouflage, the insincere property of positional information greatly hinder The further commercialization based on location-based service technology is hindered.With the development of Internet of Things, the demand of all things on earth interconnection causes position to believe The credible lifting of breath, which becomes one, to be solved the problems, such as.Also, the demands such as charging that position uses, charge are also without abundant Consider.
The content of the invention
The present invention is based on adding trustworthy location on the basis of location-based service technological frame existing, can pretend to avoid position The harm brought, and the operation such as can be valuated, charged to the use of trustworthy location, realize the safe and effective of trustworthy location Operation.
The technical solution adopted by the present invention to solve the technical problems is:
A kind of trustworthy location operation management method, including trustworthy location generating means, trustworthy location operation management platform, trusted bit Put use device and trustworthy location user.The trustworthy location generating means of the present invention are given birth to by credible root node of reliable hardware chip Into trustworthy location, and it is supplied to trustworthy location management platform;Trust chain is generated by trustworthy location operation management platform, and to outgoing Cloth trustworthy location and expenses standard;Trustworthy location use device reads and verifies the trusted bit of trustworthy location management platform issue Put;Trustworthy location user obtains trustworthy location by trustworthy location use device.
Trustworthy location management platform, uniformly connects the trustworthy location generating means of different manufacturers, different operators Enter;The trustworthy location use device of different manufacturers, different operators is uniformly accessed into;Offer to trustworthy location carries out Price, the use to trustworthy location carry out charging;
On the basis of above-mentioned any embodiment, further, the trustworthy location information includes base position information and adds Trustworthy location information, wherein, the base position information is current geographic position information, and the additional trustworthy location information is institute State the result of calculation value that reliable hardware chip is generated according to Predistribution Algorithm;
On this basis, further, the trustworthy location generating means for for the first time use input position coordinate after i.e. can not Arbitrarily change, for ensuring the uniqueness of position, built-in inspection software, device movement in a device then starts position failure and calculates Method.
On the basis of above-mentioned any embodiment, further, an application corresponds to a trustworthy location use device, User that one application can carry out the position, time point, operation are sent to trustworthy location operation management platform, and generate white name Single trust chain.
On the basis of above-mentioned any embodiment, further, trustworthy location is used key by trustworthy location use device It is sent to trustworthy location user.
On the basis of above-mentioned any embodiment, further, position is sent to by trustworthy location user using key can Believe position generating means, and establish the connection with trustworthy location.
The beneficial effects of the invention are as follows:
The present invention is based on adding trustworthy location on the basis of location-based service technological frame existing, can come to avoid position camouflage belt Harm, and the operation such as can be valuated, charged to the use of trustworthy location, realizes the Effective Operation of trustworthy location.It is logical Cross and use trustworthy location provided by the invention, it is possible to achieve a function of an application can only be in a trustworthy location by one User is used with a subscription price.This not only increases the security of location-based service, while also provides a kind of credible The operation means of position.In conclusion the present invention has the characteristics that security and good economy performance.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, below with presently preferred embodiments of the present invention and coordinate attached drawing describe in detail as after.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole attached drawing, identical component is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of schematic diagram for trustworthy location operation management method that the embodiment of the present invention one provides;
Fig. 2 shows a kind of concrete case schematic diagram for trustworthy location operation management method that the embodiment of the present invention one provides.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiments obtained without creative efforts, belong to the scope of protection of the invention.
An embodiment of the present invention provides a kind of trustworthy location operation management method, including it is trustworthy location generating means, credible Position operation management platform, trustworthy location use device and trustworthy location user.The embodiment of the present invention has the technical effect that so Realize:
As shown in Figure 1:In S101, trustworthy location generating means generate trusted bit by credible root node of reliable hardware chip Put, and be supplied to trustworthy location management platform.Trustworthy location information includes base position information and additional trustworthy location information, institute It is current geographic position information to state base position information, and the additional trustworthy location information is the reliable hardware chip according to pre- Put the result of calculation value of algorithm generation.
In S102, trustworthy location management platform receives the trustworthy location information that trustworthy location generating means are sent, according to The classification generation adapter of trustworthy location generating means, accesses trustworthy location management platform.With built in trustworthy location management platform Reliable hardware chip is root, with hexa-atomic group(Using, trustworthy location, user, time point, operation, price)Information is raw as input Into white list trust chain.Concurrent cloth carries the trustworthy location of public key information.
In S103, trustworthy location use device reads and verifies the trustworthy location of trustworthy location management platform issue.This In inventive embodiments, trustworthy location use device can pass through the proof of algorithm trustworthy location built in device.Since trustworthy location makes Trust chain generation and verification work are all carried out by trustworthy location management platform with device and trustworthy location generating means, so this Trustworthy location use device and trustworthy location generating means in invention are transparent mutually in key use aspect, this also ensures The security of trustworthy location.
In S104, trustworthy location user obtains trustworthy location by trustworthy location use device, obtains in white list Application service.Here, after trustworthy location user receives the confirmation message of trustworthy location use device, you can made using trustworthy location With the function on device white list;And trustworthy location use information is further delivered to trustworthy location operation management platform.
Further, trustworthy location generating means can not be changed arbitrarily after using input position coordinate for the first time, be used for Ensure the uniqueness of position, in a device built-in inspection software, start failure algorithm in position if device moves.Which ensure that can Believe the security of root position.
On the basis of above-mentioned any embodiment, further, offer of the trustworthy location management platform to trustworthy location into Row price, the use to trustworthy location carry out charging, there is provided a kind of operation means of trustworthy location.
On the basis of above-mentioned any embodiment, further, trustworthy location generating means are loaded on field device, existing Field device can be integrally fixed at the trusted signal source on wall.
On the basis of above-mentioned any embodiment, further, trustworthy location use device is loaded on central apparatus, in Heart equipment can be trusted servers or trusted computer.
Present invention also offers a kind of embodiment, as shown in Fig. 2, the embodiment of the present invention is set using mobile phone or PC machine as user It is standby, the equipment centered on PC server.
The first step, the initialization of trustworthy location generating means, is encrypted according to the physical location of device, device TCM built-in chip types The information such as algorithm, key generate trustworthy location.Such as:Certain trustworthy location service company is by No. L01 of prosperous north airport parking lot B areas The physical location information of positioner is as input, the trustworthy location information of generation TL01 trustworthy locations;If physical location Information changes, and the position detecting module built in device then starts TL01 positions failure algorithm, by L01 positioner marks Know for insincere position.Trustworthy location information is periodically issued trustworthy location by trustworthy location generating means by position sending module Operation management platform.
Trustworthy location operation management platform, which docks received trustworthy location information, to be verified, and credible with what is be verified Positional information is root, generates initial trust chain.The trust chain is responsible for verifying the application clothes that some user possesses in the trustworthy location Business authority.
Second step, trustworthy location use device inquire about trustworthy location operation management platform, and obtaining application service needs The trustworthy location wanted and using price, the application service that some user is able to access that in this trustworthy location is believed as input Breath, write-in trustworthy location update the trust chain of the trustworthy location using reservation module.Such as:Lee of certain car rental system Bright user can use vehicle unlock and vehicle to give back function in TL01 trustworthy locations.
3rd step, trustworthy location user is when calling some application service, it is necessary to first access trustworthy location on some position Use device, is inquired about in the available trustworthy location of the position application service.Such as:Li Ming user's hand of certain car rental system The trustworthy location that machine can use on Chang Bei airports is parking lot B areas TL01 trustworthy locations.
4th step, trustworthy location use device will use close in the available trustworthy location of the position application service and position Key is sent to trustworthy location user.Such as:The trustworthy location use device of certain car rental system is by prosperous north airport parking lot B areas TL01 trustworthy location authentication secrets are sent to Li Ming user mobile phones.
Position is sent to trustworthy location generating means by the 5th step, trustworthy location user using key, and establish with it is credible The connection of position.For example, the car rental system APP disposed on Li Ming user mobile phones establishes the company with TL01 trustworthy locations Connect.
6th step, trustworthy location generating means send confirmation message to trustworthy location user.For example, TL01 trustworthy locations The car rental system APP disposed on to Li Ming user mobile phones sends trustworthy location confirmation message.At this time, on Li Ming user mobile phones Vehicle unlocking function can be used in the car rental system APP of deployment.
Trustworthy location operation management platform will use foundation with above-mentioned confirmation message as trustworthy location, carry out charging behaviour Make.
7th step, the service condition of trustworthy location operation management platform record trustworthy location, cost information.And by trusted bit Put and be sent to trustworthy location use device using bill, this uses the mark terminated as trustworthy location.For example, certain vehicle leasing System receives the use bill of the TL01 trustworthy locations in a prosperous north airport parking lot B area.
It can see from above-mentioned example, by using trustworthy location provided by the invention, the Li Ming of certain car rental system After user reaches Chang Bei airports, you can see that an available trustworthy location TL01 is located at parking lot B areas on mobile phone.This for While compartment leasing system user provides effectively positioning, also define that trustworthy location TL01 can only be used by the position of charges paid Device uses, this not only increases the security of location-based service, while also provides a kind of operation means of trustworthy location.To sum up Described, the present invention has the characteristics that security and good economy performance.
It should be noted that:For foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement because According to the present invention, some steps can use other orders or be carried out at the same time.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention It is necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
It is understood that the correlated characteristic in the above method and interchanger can be referred to mutually.In addition, above-described embodiment In " first ", " second " etc. be to be used to distinguish each embodiment, and do not represent the quality of each embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the method for foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, details are not described herein.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the device in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is to this specification(Including adjoint claim, summary and attached drawing)Disclosed in all features and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power Profit requirement, summary and attached drawing)Disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be with hardware realization, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor or digital signal processor(DSP)Come realize in the device provided according to embodiments of the present invention some or it is complete The some or all functions of portion's component.The present invention be also implemented as a part for performing method as described herein or The equipment or program of device of person's whole(For example, computer program and computer program product).It is such to realize the present invention's Program can store on a computer-readable medium, or can have the form of one or more signal.Such signal It can download and obtain from internet website, either provide on carrier signal or provided in the form of any other.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.

Claims (7)

  1. A kind of 1. trustworthy location operation management method, it is characterised in that:The described method includes:
    Trustworthy location generating means, trustworthy location is generated by credible root node of reliable hardware chip, and is supplied to trustworthy location Management platform;
    Trustworthy location operation management platform, generates trust chain, and externally issues trustworthy location and expenses standard;
    Trustworthy location use device, reads and verifies the trustworthy location of trustworthy location management platform issue;
    Trustworthy location user, trustworthy location is obtained by trustworthy location use device.
  2. A kind of 2. trustworthy location operation management method according to claim 1, it is characterised in that:The trustworthy location generation Device generates trustworthy location information by credible root node of reliable hardware chip;The trustworthy location information is believed including base position Breath and additional trustworthy location information, wherein, the base position information is current geographic position information, the additional trustworthy location Information is the result of calculation value that the reliable hardware chip is generated according to Predistribution Algorithm.
  3. A kind of 3. trustworthy location operation management method according to claim 1, it is characterised in that:The trustworthy location generation Device can not be changed arbitrarily after using input position coordinate for first time, interior in a device for ensuring the uniqueness of position Inspection software is put, device movement then starts position failure algorithm.
  4. A kind of 4. trustworthy location operation management method according to claim 1, it is characterised in that:Trustworthy location operation management Platform is uniformly accessed into the trustworthy location generating means of different manufacturers, different operators;To different manufacturers, different fortune The trustworthy location use device of battalion business is uniformly accessed into;Offer to trustworthy location is fixed a price, the use to trustworthy location Carry out charging.
  5. A kind of 5. trustworthy location operation management method according to claim 1, it is characterised in that:One application corresponds to one A trustworthy location use device, user that an application can carry out the position, time point, operation are sent to trustworthy location operation Management platform, and generate white list trust chain.
  6. A kind of 6. trustworthy location operation management method according to claim 1, it is characterised in that:Trustworthy location use device Trustworthy location is sent to trustworthy location user using key.
  7. A kind of 7. trustworthy location operation management method according to claim 1, it is characterised in that:Trustworthy location user is by position Put and be sent to trustworthy location generating means using key, and establish the connection with trustworthy location, obtain the application clothes in white list Business.
CN201711214443.0A 2017-11-28 2017-11-28 A kind of trustworthy location operation management method Pending CN107979813A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711214443.0A CN107979813A (en) 2017-11-28 2017-11-28 A kind of trustworthy location operation management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711214443.0A CN107979813A (en) 2017-11-28 2017-11-28 A kind of trustworthy location operation management method

Publications (1)

Publication Number Publication Date
CN107979813A true CN107979813A (en) 2018-05-01

Family

ID=62012118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711214443.0A Pending CN107979813A (en) 2017-11-28 2017-11-28 A kind of trustworthy location operation management method

Country Status (1)

Country Link
CN (1) CN107979813A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101689311A (en) * 2007-06-26 2010-03-31 Nxp股份有限公司 Road toll system
CN102663837A (en) * 2012-05-18 2012-09-12 无锡普智联科高新技术有限公司 Side parking charging system and method based on mobile phone client
CN102860100A (en) * 2010-03-10 2013-01-02 交互数字专利控股公司 Location determination of infrastructure device and terminal device
CN103093641A (en) * 2011-11-02 2013-05-08 中兴通讯股份有限公司 Method capable of achieving parking lot information inquiry on mobile terminal and server thereof
US20140248887A1 (en) * 2013-03-04 2014-09-04 T-Mobile Usa, Inc. Closed Communication System
CN105049257A (en) * 2015-08-12 2015-11-11 北京因特信安软件科技有限公司 Cloud platform scheduling method based on trusted geographical location information
WO2016107470A1 (en) * 2014-12-30 2016-07-07 腾讯科技(深圳)有限公司 Parking management method, server, user terminal, and system
CN106792551A (en) * 2017-02-21 2017-05-31 上海量明科技发展有限公司 Distinguish the method for charging, order car terminal and system in shared vehicle parking position

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101689311A (en) * 2007-06-26 2010-03-31 Nxp股份有限公司 Road toll system
CN102860100A (en) * 2010-03-10 2013-01-02 交互数字专利控股公司 Location determination of infrastructure device and terminal device
CN103093641A (en) * 2011-11-02 2013-05-08 中兴通讯股份有限公司 Method capable of achieving parking lot information inquiry on mobile terminal and server thereof
CN102663837A (en) * 2012-05-18 2012-09-12 无锡普智联科高新技术有限公司 Side parking charging system and method based on mobile phone client
US20140248887A1 (en) * 2013-03-04 2014-09-04 T-Mobile Usa, Inc. Closed Communication System
WO2016107470A1 (en) * 2014-12-30 2016-07-07 腾讯科技(深圳)有限公司 Parking management method, server, user terminal, and system
CN105049257A (en) * 2015-08-12 2015-11-11 北京因特信安软件科技有限公司 Cloud platform scheduling method based on trusted geographical location information
CN106792551A (en) * 2017-02-21 2017-05-31 上海量明科技发展有限公司 Distinguish the method for charging, order car terminal and system in shared vehicle parking position

Similar Documents

Publication Publication Date Title
CN109981679B (en) Method and apparatus for performing transactions in a blockchain network
CN110602089A (en) Block chain-based medical data storage method, device, equipment and storage medium
CN106134143B (en) Method, apparatus and system for dynamic network access-in management
US20210117578A1 (en) Apparatus, systems, and methods to protect hardware and software
US9491183B1 (en) Geographic location-based policy
CN109146679A (en) Intelligent contract call method and device, electronic equipment based on block chain
CN105306676B (en) Access the method, apparatus and system of smart machine
CN102904869B (en) Method and apparatus for remote authentication
CN104838630A (en) Policy-based application management
CN108197891A (en) A kind of electronic signature device and method based on block chain
CN106797383A (en) Security context management in multi-tenant environment
CN106537871A (en) System, method and apparatus for providing enrollment of devices in a network
EP3758403A1 (en) Smart management device, smart lock device and smart management device identification method
CN107209659A (en) Mobile authentication in mobile virtual network
CN103378987B (en) For multiple security domains being carried out the method and system of tactical management
CN104008324A (en) Terminal and server for applying security policy, and method of controlling the same
CN110730153A (en) Account configuration method, device and system of cloud equipment and data processing method
CN111355732B (en) Link detection method and device, electronic equipment and storage medium
CN106664512A (en) Triggering of ota provisioning of sim applications by nfc
CN106161424A (en) For determining method and the computer system of the reliability rating between communication equipment
CN105989275A (en) Method and system for authentication
CN107209678A (en) System and method for the adaptive clone of mobile device
CN105516258A (en) Information interaction system, method and device
CN107967759A (en) Mobile power leasing method, device, terminal and computer-readable recording medium
CN108476135A (en) The access control of numerical data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180501