CN107979813A - A kind of trustworthy location operation management method - Google Patents
A kind of trustworthy location operation management method Download PDFInfo
- Publication number
- CN107979813A CN107979813A CN201711214443.0A CN201711214443A CN107979813A CN 107979813 A CN107979813 A CN 107979813A CN 201711214443 A CN201711214443 A CN 201711214443A CN 107979813 A CN107979813 A CN 107979813A
- Authority
- CN
- China
- Prior art keywords
- trustworthy location
- trustworthy
- location
- operation management
- management platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 44
- 238000000034 method Methods 0.000 claims description 15
- 238000004422 calculation algorithm Methods 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000004744 fabric Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000000875 corresponding effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0283—Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Tourism & Hospitality (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Human Resources & Organizations (AREA)
- Game Theory and Decision Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of trustworthy location operation management method, including trustworthy location generating means, trustworthy location operation management platform, trustworthy location use device and trustworthy location user.The trustworthy location generating means of the present invention generate trustworthy location by credible root node of reliable hardware chip, and are supplied to trustworthy location management platform;Trust chain is generated by trustworthy location operation management platform, and externally issues trustworthy location and expenses standard;Trustworthy location use device reads and verifies the trustworthy location of trustworthy location management platform issue;Trustworthy location user obtains trustworthy location by trustworthy location use device.Therefore, the present invention is based on adding trustworthy location on the basis of location-based service technological frame existing, the harm that can come to avoid position camouflage belt, and the operation such as can be valuated, charged to the use of trustworthy location, realizes the safe and effective operation of trustworthy location.
Description
Technical field
The present invention relates to computer realm, more particularly to a kind of trustworthy location operation management method.
Background technology
Location-based service refers to the service for providing object geographical location information, and it is in emergency circumstances rapid fixed to be mainly used for improving in early days
The scene of position person for help.A large amount of new applications are generated in mobile Internet evolution, these applications can with terminal
It is mobile, can position and the characteristic such as carry with and be combined, provide personalization, the relevant service in position to the user.Current
The research field of art circle focuses more on user individual behavior and swarm intelligence etc..With mobile Internet and position
The development and fusion of service technology, have had many commercially produced products based on location-based service, for example, vehicle-mounted lead in industrial circle
Navigate software and hardware, wechat, phone wrist-watch etc..But the continuous development of position camouflage, the insincere property of positional information greatly hinder
The further commercialization based on location-based service technology is hindered.With the development of Internet of Things, the demand of all things on earth interconnection causes position to believe
The credible lifting of breath, which becomes one, to be solved the problems, such as.Also, the demands such as charging that position uses, charge are also without abundant
Consider.
The content of the invention
The present invention is based on adding trustworthy location on the basis of location-based service technological frame existing, can pretend to avoid position
The harm brought, and the operation such as can be valuated, charged to the use of trustworthy location, realize the safe and effective of trustworthy location
Operation.
The technical solution adopted by the present invention to solve the technical problems is:
A kind of trustworthy location operation management method, including trustworthy location generating means, trustworthy location operation management platform, trusted bit
Put use device and trustworthy location user.The trustworthy location generating means of the present invention are given birth to by credible root node of reliable hardware chip
Into trustworthy location, and it is supplied to trustworthy location management platform;Trust chain is generated by trustworthy location operation management platform, and to outgoing
Cloth trustworthy location and expenses standard;Trustworthy location use device reads and verifies the trusted bit of trustworthy location management platform issue
Put;Trustworthy location user obtains trustworthy location by trustworthy location use device.
Trustworthy location management platform, uniformly connects the trustworthy location generating means of different manufacturers, different operators
Enter;The trustworthy location use device of different manufacturers, different operators is uniformly accessed into;Offer to trustworthy location carries out
Price, the use to trustworthy location carry out charging;
On the basis of above-mentioned any embodiment, further, the trustworthy location information includes base position information and adds
Trustworthy location information, wherein, the base position information is current geographic position information, and the additional trustworthy location information is institute
State the result of calculation value that reliable hardware chip is generated according to Predistribution Algorithm;
On this basis, further, the trustworthy location generating means for for the first time use input position coordinate after i.e. can not
Arbitrarily change, for ensuring the uniqueness of position, built-in inspection software, device movement in a device then starts position failure and calculates
Method.
On the basis of above-mentioned any embodiment, further, an application corresponds to a trustworthy location use device,
User that one application can carry out the position, time point, operation are sent to trustworthy location operation management platform, and generate white name
Single trust chain.
On the basis of above-mentioned any embodiment, further, trustworthy location is used key by trustworthy location use device
It is sent to trustworthy location user.
On the basis of above-mentioned any embodiment, further, position is sent to by trustworthy location user using key can
Believe position generating means, and establish the connection with trustworthy location.
The beneficial effects of the invention are as follows:
The present invention is based on adding trustworthy location on the basis of location-based service technological frame existing, can come to avoid position camouflage belt
Harm, and the operation such as can be valuated, charged to the use of trustworthy location, realizes the Effective Operation of trustworthy location.It is logical
Cross and use trustworthy location provided by the invention, it is possible to achieve a function of an application can only be in a trustworthy location by one
User is used with a subscription price.This not only increases the security of location-based service, while also provides a kind of credible
The operation means of position.In conclusion the present invention has the characteristics that security and good economy performance.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, below with presently preferred embodiments of the present invention and coordinate attached drawing describe in detail as after.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area
Technical staff will be clear understanding.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole attached drawing, identical component is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of schematic diagram for trustworthy location operation management method that the embodiment of the present invention one provides;
Fig. 2 shows a kind of concrete case schematic diagram for trustworthy location operation management method that the embodiment of the present invention one provides.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
All other embodiments obtained without creative efforts, belong to the scope of protection of the invention.
An embodiment of the present invention provides a kind of trustworthy location operation management method, including it is trustworthy location generating means, credible
Position operation management platform, trustworthy location use device and trustworthy location user.The embodiment of the present invention has the technical effect that so
Realize:
As shown in Figure 1:In S101, trustworthy location generating means generate trusted bit by credible root node of reliable hardware chip
Put, and be supplied to trustworthy location management platform.Trustworthy location information includes base position information and additional trustworthy location information, institute
It is current geographic position information to state base position information, and the additional trustworthy location information is the reliable hardware chip according to pre-
Put the result of calculation value of algorithm generation.
In S102, trustworthy location management platform receives the trustworthy location information that trustworthy location generating means are sent, according to
The classification generation adapter of trustworthy location generating means, accesses trustworthy location management platform.With built in trustworthy location management platform
Reliable hardware chip is root, with hexa-atomic group(Using, trustworthy location, user, time point, operation, price)Information is raw as input
Into white list trust chain.Concurrent cloth carries the trustworthy location of public key information.
In S103, trustworthy location use device reads and verifies the trustworthy location of trustworthy location management platform issue.This
In inventive embodiments, trustworthy location use device can pass through the proof of algorithm trustworthy location built in device.Since trustworthy location makes
Trust chain generation and verification work are all carried out by trustworthy location management platform with device and trustworthy location generating means, so this
Trustworthy location use device and trustworthy location generating means in invention are transparent mutually in key use aspect, this also ensures
The security of trustworthy location.
In S104, trustworthy location user obtains trustworthy location by trustworthy location use device, obtains in white list
Application service.Here, after trustworthy location user receives the confirmation message of trustworthy location use device, you can made using trustworthy location
With the function on device white list;And trustworthy location use information is further delivered to trustworthy location operation management platform.
Further, trustworthy location generating means can not be changed arbitrarily after using input position coordinate for the first time, be used for
Ensure the uniqueness of position, in a device built-in inspection software, start failure algorithm in position if device moves.Which ensure that can
Believe the security of root position.
On the basis of above-mentioned any embodiment, further, offer of the trustworthy location management platform to trustworthy location into
Row price, the use to trustworthy location carry out charging, there is provided a kind of operation means of trustworthy location.
On the basis of above-mentioned any embodiment, further, trustworthy location generating means are loaded on field device, existing
Field device can be integrally fixed at the trusted signal source on wall.
On the basis of above-mentioned any embodiment, further, trustworthy location use device is loaded on central apparatus, in
Heart equipment can be trusted servers or trusted computer.
Present invention also offers a kind of embodiment, as shown in Fig. 2, the embodiment of the present invention is set using mobile phone or PC machine as user
It is standby, the equipment centered on PC server.
The first step, the initialization of trustworthy location generating means, is encrypted according to the physical location of device, device TCM built-in chip types
The information such as algorithm, key generate trustworthy location.Such as:Certain trustworthy location service company is by No. L01 of prosperous north airport parking lot B areas
The physical location information of positioner is as input, the trustworthy location information of generation TL01 trustworthy locations;If physical location
Information changes, and the position detecting module built in device then starts TL01 positions failure algorithm, by L01 positioner marks
Know for insincere position.Trustworthy location information is periodically issued trustworthy location by trustworthy location generating means by position sending module
Operation management platform.
Trustworthy location operation management platform, which docks received trustworthy location information, to be verified, and credible with what is be verified
Positional information is root, generates initial trust chain.The trust chain is responsible for verifying the application clothes that some user possesses in the trustworthy location
Business authority.
Second step, trustworthy location use device inquire about trustworthy location operation management platform, and obtaining application service needs
The trustworthy location wanted and using price, the application service that some user is able to access that in this trustworthy location is believed as input
Breath, write-in trustworthy location update the trust chain of the trustworthy location using reservation module.Such as:Lee of certain car rental system
Bright user can use vehicle unlock and vehicle to give back function in TL01 trustworthy locations.
3rd step, trustworthy location user is when calling some application service, it is necessary to first access trustworthy location on some position
Use device, is inquired about in the available trustworthy location of the position application service.Such as:Li Ming user's hand of certain car rental system
The trustworthy location that machine can use on Chang Bei airports is parking lot B areas TL01 trustworthy locations.
4th step, trustworthy location use device will use close in the available trustworthy location of the position application service and position
Key is sent to trustworthy location user.Such as:The trustworthy location use device of certain car rental system is by prosperous north airport parking lot B areas
TL01 trustworthy location authentication secrets are sent to Li Ming user mobile phones.
Position is sent to trustworthy location generating means by the 5th step, trustworthy location user using key, and establish with it is credible
The connection of position.For example, the car rental system APP disposed on Li Ming user mobile phones establishes the company with TL01 trustworthy locations
Connect.
6th step, trustworthy location generating means send confirmation message to trustworthy location user.For example, TL01 trustworthy locations
The car rental system APP disposed on to Li Ming user mobile phones sends trustworthy location confirmation message.At this time, on Li Ming user mobile phones
Vehicle unlocking function can be used in the car rental system APP of deployment.
Trustworthy location operation management platform will use foundation with above-mentioned confirmation message as trustworthy location, carry out charging behaviour
Make.
7th step, the service condition of trustworthy location operation management platform record trustworthy location, cost information.And by trusted bit
Put and be sent to trustworthy location use device using bill, this uses the mark terminated as trustworthy location.For example, certain vehicle leasing
System receives the use bill of the TL01 trustworthy locations in a prosperous north airport parking lot B area.
It can see from above-mentioned example, by using trustworthy location provided by the invention, the Li Ming of certain car rental system
After user reaches Chang Bei airports, you can see that an available trustworthy location TL01 is located at parking lot B areas on mobile phone.This for
While compartment leasing system user provides effectively positioning, also define that trustworthy location TL01 can only be used by the position of charges paid
Device uses, this not only increases the security of location-based service, while also provides a kind of operation means of trustworthy location.To sum up
Described, the present invention has the characteristics that security and good economy performance.
It should be noted that:For foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement because
According to the present invention, some steps can use other orders or be carried out at the same time.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention
It is necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
It is understood that the correlated characteristic in the above method and interchanger can be referred to mutually.In addition, above-described embodiment
In " first ", " second " etc. be to be used to distinguish each embodiment, and do not represent the quality of each embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the method for foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, details are not described herein.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system
Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various
Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect,
Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself
Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the device in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any
Combination is to this specification(Including adjoint claim, summary and attached drawing)Disclosed in all features and so disclosed appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power
Profit requirement, summary and attached drawing)Disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be with hardware realization, or to be run on one or more processor
Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice
Microprocessor or digital signal processor(DSP)Come realize in the device provided according to embodiments of the present invention some or it is complete
The some or all functions of portion's component.The present invention be also implemented as a part for performing method as described herein or
The equipment or program of device of person's whole(For example, computer program and computer program product).It is such to realize the present invention's
Program can store on a computer-readable medium, or can have the form of one or more signal.Such signal
It can download and obtain from internet website, either provide on carrier signal or provided in the form of any other.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real
It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
Claims (7)
- A kind of 1. trustworthy location operation management method, it is characterised in that:The described method includes:Trustworthy location generating means, trustworthy location is generated by credible root node of reliable hardware chip, and is supplied to trustworthy location Management platform;Trustworthy location operation management platform, generates trust chain, and externally issues trustworthy location and expenses standard;Trustworthy location use device, reads and verifies the trustworthy location of trustworthy location management platform issue;Trustworthy location user, trustworthy location is obtained by trustworthy location use device.
- A kind of 2. trustworthy location operation management method according to claim 1, it is characterised in that:The trustworthy location generation Device generates trustworthy location information by credible root node of reliable hardware chip;The trustworthy location information is believed including base position Breath and additional trustworthy location information, wherein, the base position information is current geographic position information, the additional trustworthy location Information is the result of calculation value that the reliable hardware chip is generated according to Predistribution Algorithm.
- A kind of 3. trustworthy location operation management method according to claim 1, it is characterised in that:The trustworthy location generation Device can not be changed arbitrarily after using input position coordinate for first time, interior in a device for ensuring the uniqueness of position Inspection software is put, device movement then starts position failure algorithm.
- A kind of 4. trustworthy location operation management method according to claim 1, it is characterised in that:Trustworthy location operation management Platform is uniformly accessed into the trustworthy location generating means of different manufacturers, different operators;To different manufacturers, different fortune The trustworthy location use device of battalion business is uniformly accessed into;Offer to trustworthy location is fixed a price, the use to trustworthy location Carry out charging.
- A kind of 5. trustworthy location operation management method according to claim 1, it is characterised in that:One application corresponds to one A trustworthy location use device, user that an application can carry out the position, time point, operation are sent to trustworthy location operation Management platform, and generate white list trust chain.
- A kind of 6. trustworthy location operation management method according to claim 1, it is characterised in that:Trustworthy location use device Trustworthy location is sent to trustworthy location user using key.
- A kind of 7. trustworthy location operation management method according to claim 1, it is characterised in that:Trustworthy location user is by position Put and be sent to trustworthy location generating means using key, and establish the connection with trustworthy location, obtain the application clothes in white list Business.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711214443.0A CN107979813A (en) | 2017-11-28 | 2017-11-28 | A kind of trustworthy location operation management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711214443.0A CN107979813A (en) | 2017-11-28 | 2017-11-28 | A kind of trustworthy location operation management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107979813A true CN107979813A (en) | 2018-05-01 |
Family
ID=62012118
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711214443.0A Pending CN107979813A (en) | 2017-11-28 | 2017-11-28 | A kind of trustworthy location operation management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107979813A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101689311A (en) * | 2007-06-26 | 2010-03-31 | Nxp股份有限公司 | Road toll system |
CN102663837A (en) * | 2012-05-18 | 2012-09-12 | 无锡普智联科高新技术有限公司 | Side parking charging system and method based on mobile phone client |
CN102860100A (en) * | 2010-03-10 | 2013-01-02 | 交互数字专利控股公司 | Location determination of infrastructure device and terminal device |
CN103093641A (en) * | 2011-11-02 | 2013-05-08 | 中兴通讯股份有限公司 | Method capable of achieving parking lot information inquiry on mobile terminal and server thereof |
US20140248887A1 (en) * | 2013-03-04 | 2014-09-04 | T-Mobile Usa, Inc. | Closed Communication System |
CN105049257A (en) * | 2015-08-12 | 2015-11-11 | 北京因特信安软件科技有限公司 | Cloud platform scheduling method based on trusted geographical location information |
WO2016107470A1 (en) * | 2014-12-30 | 2016-07-07 | 腾讯科技(深圳)有限公司 | Parking management method, server, user terminal, and system |
CN106792551A (en) * | 2017-02-21 | 2017-05-31 | 上海量明科技发展有限公司 | Distinguish the method for charging, order car terminal and system in shared vehicle parking position |
-
2017
- 2017-11-28 CN CN201711214443.0A patent/CN107979813A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101689311A (en) * | 2007-06-26 | 2010-03-31 | Nxp股份有限公司 | Road toll system |
CN102860100A (en) * | 2010-03-10 | 2013-01-02 | 交互数字专利控股公司 | Location determination of infrastructure device and terminal device |
CN103093641A (en) * | 2011-11-02 | 2013-05-08 | 中兴通讯股份有限公司 | Method capable of achieving parking lot information inquiry on mobile terminal and server thereof |
CN102663837A (en) * | 2012-05-18 | 2012-09-12 | 无锡普智联科高新技术有限公司 | Side parking charging system and method based on mobile phone client |
US20140248887A1 (en) * | 2013-03-04 | 2014-09-04 | T-Mobile Usa, Inc. | Closed Communication System |
WO2016107470A1 (en) * | 2014-12-30 | 2016-07-07 | 腾讯科技(深圳)有限公司 | Parking management method, server, user terminal, and system |
CN105049257A (en) * | 2015-08-12 | 2015-11-11 | 北京因特信安软件科技有限公司 | Cloud platform scheduling method based on trusted geographical location information |
CN106792551A (en) * | 2017-02-21 | 2017-05-31 | 上海量明科技发展有限公司 | Distinguish the method for charging, order car terminal and system in shared vehicle parking position |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109981679B (en) | Method and apparatus for performing transactions in a blockchain network | |
CN110602089A (en) | Block chain-based medical data storage method, device, equipment and storage medium | |
CN106134143B (en) | Method, apparatus and system for dynamic network access-in management | |
US20210117578A1 (en) | Apparatus, systems, and methods to protect hardware and software | |
US9491183B1 (en) | Geographic location-based policy | |
CN109146679A (en) | Intelligent contract call method and device, electronic equipment based on block chain | |
CN105306676B (en) | Access the method, apparatus and system of smart machine | |
CN102904869B (en) | Method and apparatus for remote authentication | |
CN104838630A (en) | Policy-based application management | |
CN108197891A (en) | A kind of electronic signature device and method based on block chain | |
CN106797383A (en) | Security context management in multi-tenant environment | |
CN106537871A (en) | System, method and apparatus for providing enrollment of devices in a network | |
EP3758403A1 (en) | Smart management device, smart lock device and smart management device identification method | |
CN107209659A (en) | Mobile authentication in mobile virtual network | |
CN103378987B (en) | For multiple security domains being carried out the method and system of tactical management | |
CN104008324A (en) | Terminal and server for applying security policy, and method of controlling the same | |
CN110730153A (en) | Account configuration method, device and system of cloud equipment and data processing method | |
CN111355732B (en) | Link detection method and device, electronic equipment and storage medium | |
CN106664512A (en) | Triggering of ota provisioning of sim applications by nfc | |
CN106161424A (en) | For determining method and the computer system of the reliability rating between communication equipment | |
CN105989275A (en) | Method and system for authentication | |
CN107209678A (en) | System and method for the adaptive clone of mobile device | |
CN105516258A (en) | Information interaction system, method and device | |
CN107967759A (en) | Mobile power leasing method, device, terminal and computer-readable recording medium | |
CN108476135A (en) | The access control of numerical data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180501 |