CN108200174B - Based on the distributed mobile phone protecting platform of block chain and its implementation - Google Patents

Based on the distributed mobile phone protecting platform of block chain and its implementation Download PDF

Info

Publication number
CN108200174B
CN108200174B CN201810007498.2A CN201810007498A CN108200174B CN 108200174 B CN108200174 B CN 108200174B CN 201810007498 A CN201810007498 A CN 201810007498A CN 108200174 B CN108200174 B CN 108200174B
Authority
CN
China
Prior art keywords
mobile phone
node
information
block chain
manufacturer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810007498.2A
Other languages
Chinese (zh)
Other versions
CN108200174A (en
Inventor
刘明哲
杨昆
蒋鑫
杨晨
刘忆宁
王瑞利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Univeristy of Technology
Original Assignee
Chengdu Univeristy of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Univeristy of Technology filed Critical Chengdu Univeristy of Technology
Priority to CN201810007498.2A priority Critical patent/CN108200174B/en
Publication of CN108200174A publication Critical patent/CN108200174A/en
Application granted granted Critical
Publication of CN108200174B publication Critical patent/CN108200174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The problems such as the invention discloses one kind to be based on the distributed mobile phone protecting platform of block chain, mainly solves thief existing in the prior art using brush machine mode and obtains the mobile phone right to use, and user information is easy the sequence number memory difficulty of leakage and mobile phone.The platform includes manufacturer's node, market node, mobile nodes and the user node using star topology connection, manufacturer's node, market node, mobile nodes and user node include data collection module, data memory module, module of target detection and the data application module to be matched each other using publish/subscribe mode, and the Mysql database being connect with data memory module, and the block chain of real-time communication is built by manufacturer's node, market node, mobile nodes and the respective Mysql database of user node jointly.The implementation method of the mobile phone protecting platform is also disclosed in the present invention.The present invention has the characteristics that security performance is high, mobile phone protection is reliable, easy to operate, block chain information is transparent.

Description

Based on the distributed mobile phone protecting platform of block chain and its implementation
Technical field
The present invention relates to cellphone information protection technique field, be based especially on the distributed mobile phone protecting platform of block chain and Its implementation.
Background technique
Nowadays, smart phone has become the necessity of people's daily life, its function is no longer limited to communication, and And also expand the every field applied in lives such as information storage, mobile payment, intelligent navigations.Smart phone is providing the user with The problem of revealing while convenient and fast life style there is also security information, the privacy information of user is stored on mobile phone, is tied up Surely there is the payment information of user, lost mobile phone can not only make troubles to personal lifestyle, and there is also great security risks, give User results in significant economic losses.Therefore, the more and more protections for focusing on cellphone information of smart phone user.
Currently, the unpromising mobile phone in market provides the speciality platform of protection, prevent important information from letting out after smart phone is stolen Dew often relies on the SIM card of mobile phone, and after SIM card is illegally changed, smart phone sends warning short message to emergency contact Prompt, or mobile phone is remotely controlled by associated cell-phone number, and then realize locking locating cellphone.But which Equally there is also drawback, if thief, to pulling out SIM card after mobile phone upgrade processing, such long-range control will be unable to using cannot Realize the purpose of locking positioning.In addition, the means for preventing important information from revealing after stolen can also use the sequence number of mobile phone IMEI code, sequence number, which is supplied to mobile phone operators, just can be carried out phone lock, is effectively prevented important information and is compromised.But It is that the handset serial is longer, is not easy to remember, and thief is also readily available the sequence number of mobile phone, thief only needs weight New patent application serial numbers just can obtain the right to use of mobile phone, and the problem of unresolved important information leakage.
Therefore, urgent need will build a mobile phone protecting platform, solve the problems, such as handset serial memory difficulty, avoid theft Person obtains the mobile phone right to use using brush machine mode, improves user security rank, effectively solves the problems, such as that user information is revealed.
Summary of the invention
The purpose of the present invention is to provide one kind to be based on the distributed mobile phone protecting platform of block chain and its implementation, main It solving thief existing in the prior art and the mobile phone right to use is obtained using brush machine mode, user information is easy leakage, and The problems such as sequence number memory difficulty of mobile phone.
To achieve the goals above, The technical solution adopted by the invention is as follows:
Based on the distributed mobile phone protecting platform of block chain, including manufacturer's node using star topology connection, market Node, mobile nodes and user node, manufacturer's node include the data of connection of being communicated with each other using publish/subscribe mode Collection module, data memory module, module of target detection and data application module, and connect with data memory module Mysql database, the structure of the market node, mobile nodes and user node is identical as the structure of manufacturer node, and And real-time communication is built by manufacturer's node, market node, mobile nodes and the respective Mysql database of user node jointly Block chain.
Specifically, the data collection module of manufacturer's node is used to collect hand of manufacturer's node in production channel Machine basic information;The data collection module of the market node is for collecting Transaction Information of the market node in circulation; The data collection module of the user node is used to collect user node using the identity information in channel;The mobile nodes Data collection module for collecting production, circulation and using mobile phone configuration and account number cipher information in channel;The manufacturer The information that node, market node, mobile nodes and the respective data collection module of user node are collected in chronological sequence sequentially is divided It is not stored in each data memory module.
Further, each data memory module is all made of Zcash and digs mine algorithm storage manufacturer's node, city The information that field node, mobile nodes and the respective data collection module of user node are collected;Any data memory module is to mobile phone The identity information of user is verified, and is stored in each data memory module in a distributed manner.Any data store mould Block is sequentially added in block chain in chronological order by production, circulation and using the information in channel, and covers timestamp.
Further, each module of target detection is for inquiring information of any lost mobile phone in block chain.
Further, each data application module is used to extract information of the lost mobile phone in block chain, and The handset serial is sent to the 4G operator of the mobile phone and the developer for the APP software installed, realizes the lost mobile phone Function of surfing the Net and APP software using stop transport.
Preferably, the data collection module of manufacturer's node is collected into mobile phone of manufacturer's node in production channel Basic information mainly includes manufacturer, mobile phone model, handset serial, the date of production and testing department information.
Further, the data collection module of the market node is collected into transaction letter of the market node in circulation Breath includes into market hours and mobile phone ownership transfer record.
Further, the data collection module of the user node is collected into user node using the identity in channel Information includes the enrollment status of the identity of mobile phone ownership owner, the enrollment status of mobile phone and bank card and mobile phone and fund.
Further, the account number cipher information includes mobile phone protecting platform registration login account information and APP software Register login account information.
Implementation method based on the distributed mobile phone protecting platform of block chain, comprising the following steps:
Step S01, the data collection module of manufacturer's node receive the mobile phone basic information of manufacturer's node, and by the hand Machine basic information is distributed to be stored to each data memory module, is formed information block and is loaded onto block chain, and in area The sequence number of mobile phone is converted into corresponding password in block chain, executes step S02, carries out mobile phone circulation into market node.
Step S02, the data collection module of market node receive the Transaction Information in the node of market, which is formed area Block is loaded onto block chain, step S03 is executed, into user node.
Step S03, user node obtain the corresponding password of sequence number of mobile phone, register and log in mobile phone protecting platform, will The information of the registration is loaded onto block chain, and covers timestamp.
Step S04, the data collection module real-time collecting of mobile nodes are mounted on the registration of the APP software on the mobile phone The information is loaded onto block chain, and covers timestamp by login account information.
Step S05, mobile phone ownership owner is according to mobile phone protecting platform registration login account information and utilizes either objective Detection module inquires information of the lost mobile phone in block chain.
Step S06, any data application module extracts information of the lost mobile phone in block chain, by mobile phone sequence Number be sent to the 4G operator of the mobile phone and the developer for the APP software installed, realize the lost mobile phone function of surfing the Net and APP software uses stoppage in transit.
Compared with prior art, the invention has the following advantages:
(1) the characteristics of present invention can not dexterously be changed using the decentralization of block chain technology, collective's maintenance safety, information, Mobile phone protecting platform is built jointly by distributed manufacturer's node, market node, mobile nodes and user node, and is carried out Real-time communication between node.Unique handset serial is stored in block chain by manufacturer's node, when lost mobile phone or by After robber, by extracting handset serial from block chain and being sent to operator and software developer, the online for the mobile phone of stopping transport Function and APP software, the problem of efficiently solving user mobile phone information leakage and heavy economic losses, and it is complicated without remembering Handset serial.It is quick search in addition, realizing information-distribution type storage using the node structure of distributed real-time communication Lost mobile phone information provides protection basis.Moreover, each protected mobile phone and user information are stored separately on one In block chain, and it is distributed be stored in the protecting platform, thus, effectively improve mobile phone protection safety.
(2) data collection module, data memory module, module of target detection and data application mould is dexterously arranged in the present invention Block, acquired in real time by data collection module the mobile phone in production, circulation, using the information in each channel, and by the information It is stored in data memory module, forms the block chain information that can not distort, realize the production of mobile phone, circulation, using entire stream The safeguard protection of journey.When the lost mobile phone or it is stolen after, only need to just can be using mobile phone protecting platform registration login account information The information of the mobile phone is quickly found in any node, completes surfing Internet with cell phone and APP software is stopped transport.
(3) moreover, the present invention digs mine algorithm using Zcash and stores each channel information, improves module of target detection The efficiency of lost mobile phone is searched, shortens drop-out time and searches the time, by cooperating with 4G operator and APP developer, shorter Time in be just able to achieve loss stop transport online and APP software use, thus, avoid interior of mobile phone information resources reveal and money Gold loss, provides safe and reliable protecting platform for mobile phone user.
Detailed description of the invention
Fig. 1 is the structural diagram of the present invention.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples, and embodiments of the present invention include but is not limited to The following example.
Embodiment
As shown in Figure 1, the present invention provides one kind to be based on the distributed mobile phone protecting platform of block chain, according to block chain The characteristic that information can not be changed thoroughly gets rid of dependence of the anti-information leakage method of traditional stolen mobile phone to SIM card, and without note Recall cumbersome handset serial, guarantees that the information of binding mobile phone is safer.The mobile phone protecting platform includes being connected using star topology Manufacturer's node, market node, mobile nodes and the user node connect.Wherein, manufacturer's node includes using to issue/order The mode of readding communicates with each other data collection module, data memory module, module of target detection and the data application module of connection, and The Mysql database being connect with data memory module.The structure of the market node, mobile nodes and user node with manufacture The structure of quotient's node is identical, and by manufacturer's node, market node, mobile nodes and the respective Mysql data of user node The block chain of real-time communication is built jointly in library.The data collection module of manufacturer's node is for collecting manufacturer's node in life Produce the mobile phone basic information in channel.The data collection module of the market node is for collecting market node in circulation Transaction Information.The data collection module of the user node is used to collect user node using the identity information in channel. The data collection module of the mobile nodes is for collecting production, circulation and being believed using mobile phone configuration in channel and account number cipher Breath.The information that manufacturer's node, market node, mobile nodes and the respective data collection module of user node are collected is on time Between sequencing be respectively stored in each data memory module.Each data memory module is all made of Zcash and digs mine calculation Method stores the information that manufacturer's node, market node, mobile nodes and the respective data collection module of user node are collected, And the identity information of mobile phone user is verified, is stored in each data memory module in a distributed manner.Any number It is sequentially added in block chain in chronological order according to memory module by production, circulation and using the information in channel, and covers the time Stamp.Each module of target detection is for inquiring information of any lost mobile phone in block chain.Each data application The handset serial is sent to the 4G operator of the mobile phone for extracting information of the lost mobile phone in block chain by module With the developer for the APP software installed, realize that the function of surfing the Net of the lost mobile phone and APP software use stoppage in transit.
In addition, the data collection module of manufacturer's node is collected into mobile phone base of manufacturer's node in production channel Plinth information mainly includes manufacturer, mobile phone model, handset serial, the date of production and testing department information.The market node Data collection module be collected into Transaction Information of the market node in circulation include enter market hours and mobile phone ownership Transfer record.It is including hand using the identity information in channel that the data collection module of the user node, which is collected into user node, The enrollment status of the identity of machine ownership owner, the enrollment status of mobile phone and bank card and mobile phone and fund.The account is close Code information includes mobile phone protecting platform registration login account information and APP software registration login account information.
The implementation method of the mobile phone protecting platform, the specific steps are as follows:
The first step, the data collection module of manufacturer's node receive the mobile phone basic information of manufacturer's node, and by the hand Machine basic information is distributed to be stored to each data memory module, is formed information block and is loaded onto block chain, in block The sequence number of mobile phone is converted into corresponding password in chain, executes second step, carries out mobile phone circulation into market node.
Second step, the data collection module of market node receive the Transaction Information in the node of market, which is formed area Block is loaded onto block chain, third step is executed, into user node.
Third step, user node obtain the corresponding password of sequence number of mobile phone, mobile phone protecting platform are registered and log in, by this The information of registration is loaded onto block chain, and covers timestamp.Machine user's registration logs in the protecting platform, is module of target detection Target mobile phones can be quickly detected to provide safeguard, and user needs to store mobile phone and user information to the protection respectively and put down In four distributed nodes of platform.In this way, user lost mobile phone or it is stolen in the case where, the registration could be used Login account information carries out mobile phone and user information protection.
4th step, the data collection module real-time collecting of mobile nodes are mounted on the registration of the APP software on the mobile phone The information is loaded onto block chain, and covers timestamp by login account information.The distributed Mysql number of the protecting platform According to the P2P technology of Cooley block chain, information real-time communication is realized, and can carry out data transmission, save and transmit Operation.
5th step, mobile phone ownership owner are examined according to mobile phone protecting platform registration login account information and using either objective Survey information of the module polls lost mobile phone in block chain.
6th step, any data application module extracts information of the lost mobile phone in block chain, by mobile phone sequence Number be sent to the 4G operator of the mobile phone and the developer for the APP software installed, realize the lost mobile phone function of surfing the Net and APP software uses stoppage in transit.
The features such as present invention can not cleverly be distorted using the decentralization of block chain, collective's maintenance safety, information, passes through Manufacturer's node, market node, mobile nodes and user node are disposed in a distributed manner, and real-time communication is built by each node jointly Data transmission, in chronological sequence sequentially form block chain.Manufacturer's node and market node are used as basic node, will produce, Information in circulation is stored in block chain, provides safeguard for mobile phones enquiring, protection, and mobile nodes and user node conduct The core node of protecting platform is logged in the protecting platform for user's registration, and is added by the information of user, using the information of software It is loaded onto block chain, provides basis for cellphone information protection.By the cooperation with 4G operator and APP developer, mobile phone is realized With the safeguard protection of user information.In conclusion the present invention has, security performance is high, protection is reliable, block chain information is transparent etc. Feature has substantive distinguishing features outstanding and significant progress compared with prior art, has in the stolen protection technique field of mobile phone There are vast market prospect and promotional value.
Above-described embodiment is merely a preferred embodiment of the present invention, and it is not intended to limit the protection scope of the present invention, as long as using Design principle of the invention, and the non-creative variation worked and made is carried out on this basis, it should belong to of the invention Within protection scope.

Claims (6)

1. being based on the distributed mobile phone protecting platform of block chain, which is characterized in that including the manufacturer using star topology connection Node, market node, mobile nodes and user node, manufacturer's node include being communicated with each other using publish/subscribe mode Data collection module, data memory module, module of target detection and the data application module of connection, and and data memory module The Mysql database of connection, the structure of the market node, mobile nodes and user node with the structure phase of manufacturer node Together, and by manufacturer's node, market node, mobile nodes and the respective Mysql database of user node it builds jointly in real time The block chain of communication;
The data collection module of manufacturer's node is used to collect mobile phone basic information of manufacturer's node in production channel; The data collection module of the market node is for collecting Transaction Information of the market node in circulation;The user node Data collection module be used to collect user node using the identity information in channel;The data collection mould of the mobile nodes Block is for collecting production, circulation and using mobile phone configuration and account number cipher information in channel;Manufacturer's node, market section The information that point, mobile nodes and the respective data collection module of user node are collected in chronological sequence sequentially is respectively stored in each In data memory module;
Each data memory module is all made of Zcash and digs mine algorithm storage manufacturer's node, market node, mobile phone section The information that point and the respective data collection module of user node are collected;Identity information of any data memory module to mobile phone user It is verified, and is stored in each data memory module in a distributed manner;Any data memory module will produce, circulation and It is sequentially added in block chain in chronological order using the information in channel, and covers timestamp;
Each module of target detection is for inquiring information of any lost mobile phone in block chain;
Each data application module sends out the handset serial for extracting information of the lost mobile phone in block chain It send to the developer of the 4G operator of the mobile phone and the APP software installed, realizes that the function of surfing the Net of the lost mobile phone and APP are soft Part uses stoppage in transit.
2. according to claim 1 be based on the distributed mobile phone protecting platform of block chain, which is characterized in that the manufacturer It mainly includes manufacturer, hand that the data collection module of node, which is collected into mobile phone basic information of manufacturer's node in production channel, Type number, handset serial, the date of production and testing department information.
3. according to claim 2 be based on the distributed mobile phone protecting platform of block chain, which is characterized in that the market section It includes weighing into market hours and mobile phone that the data collection module of point, which is collected into Transaction Information of the market node in circulation, Belong to transfer record.
4. described in any item according to claim 1~3 be based on the distributed mobile phone protecting platform of block chain, which is characterized in that It is including that mobile phone ownership is gathered around using the identity information in channel that the data collection module of the user node, which is collected into user node, The enrollment status of the identity for the person of having, the enrollment status of mobile phone and bank card and mobile phone and fund.
5. according to claim 4 be based on the distributed mobile phone protecting platform of block chain, which is characterized in that the account is close Code information includes mobile phone protecting platform registration login account information and APP software registration login account information.
6. a kind of implementation method according to claim 5 based on the distributed mobile phone protecting platform of block chain, feature It is, comprising the following steps:
Step S01, the data collection module of manufacturer's node receive the mobile phone basic information of manufacturer's node, and by the mobile phone base Storing to each data memory module for plinth information-distribution type, forms information block and is loaded onto block chain, in block chain The sequence number of mobile phone is converted into corresponding password, executes step S02, carries out mobile phone circulation into market node;
Step S02, the data collection module of market node receive the Transaction Information in the node of market, and information formation block is added It is loaded onto block chain, step S03 is executed, into user node;
Step S03, user node obtain the corresponding password of sequence number of mobile phone, mobile phone protecting platform are registered and log in, by the note The information of volume is loaded onto block chain, and covers timestamp;
Step S04, the registration that the data collection module real-time collecting of mobile nodes is mounted on the APP software on the mobile phone log in The information is loaded onto block chain, and covers timestamp by account information;
Step S05, mobile phone ownership owner are detected according to mobile phone protecting platform registration login account information and using either objective Information of the module polls lost mobile phone in block chain;
Step S06, any data application module extract information of the lost mobile phone in block chain, handset serial are sent out It send to the developer of the 4G operator of the mobile phone and the APP software installed, realizes that the function of surfing the Net of the lost mobile phone and APP are soft Part uses stoppage in transit.
CN201810007498.2A 2018-01-04 2018-01-04 Based on the distributed mobile phone protecting platform of block chain and its implementation Active CN108200174B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810007498.2A CN108200174B (en) 2018-01-04 2018-01-04 Based on the distributed mobile phone protecting platform of block chain and its implementation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810007498.2A CN108200174B (en) 2018-01-04 2018-01-04 Based on the distributed mobile phone protecting platform of block chain and its implementation

Publications (2)

Publication Number Publication Date
CN108200174A CN108200174A (en) 2018-06-22
CN108200174B true CN108200174B (en) 2019-10-25

Family

ID=62587876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810007498.2A Active CN108200174B (en) 2018-01-04 2018-01-04 Based on the distributed mobile phone protecting platform of block chain and its implementation

Country Status (1)

Country Link
CN (1) CN108200174B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019227225A1 (en) * 2018-05-30 2019-12-05 Skrumble Technologies Inc. Systems and methods for establishing communications via blockchain
CN109379266B (en) * 2018-09-29 2021-05-07 湖南智慧政务区块链科技有限公司 Method and system for constructing multi-layer government affair block chain network based on star network
US10848622B2 (en) 2019-04-18 2020-11-24 Red Hat, Inc. Control information for public switched telephone network (PSTN) using blockchain system
CN110245193A (en) * 2019-06-24 2019-09-17 中云(广州)区块链科技有限公司 The deposit of data distribution formula and data retrieval method based on block chain
CN110569631B (en) * 2019-09-10 2021-09-21 腾讯科技(深圳)有限公司 Account number detection method, device, equipment and storage medium based on block chain
CN111586059B (en) * 2020-05-09 2021-04-16 杭州安存网络科技有限公司 Block chain machine, block chain data access authentication method and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931052A (en) * 2016-04-21 2016-09-07 四川大学 Virtual currency transaction validation method based on block chain multi-factor cross-validation
CN106600403A (en) * 2016-11-07 2017-04-26 北京金股链科技有限公司 Asset management method, device and system
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN106911470A (en) * 2017-01-23 2017-06-30 北京航空航天大学 A kind of bit coin transaction privacy Enhancement Method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004201038A (en) * 2002-12-18 2004-07-15 Internatl Business Mach Corp <Ibm> Data storage device, information processing apparatus mounted therewith, and data processing method and program thereof
WO2013130561A2 (en) * 2012-02-29 2013-09-06 Good Technology Corporation Method of operating a computing device, computing device and computer program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931052A (en) * 2016-04-21 2016-09-07 四川大学 Virtual currency transaction validation method based on block chain multi-factor cross-validation
CN106600403A (en) * 2016-11-07 2017-04-26 北京金股链科技有限公司 Asset management method, device and system
CN106911470A (en) * 2017-01-23 2017-06-30 北京航空航天大学 A kind of bit coin transaction privacy Enhancement Method
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system

Also Published As

Publication number Publication date
CN108200174A (en) 2018-06-22

Similar Documents

Publication Publication Date Title
CN108200174B (en) Based on the distributed mobile phone protecting platform of block chain and its implementation
CN104517336B (en) Yunmen access control system and its implementation based on mobile internet
CN1611060B (en) Radio identification system
CN104244254B (en) Method and device for detecting pseudo base station based on short message center number
CN107734460A (en) A kind of method and terminal that bluetooth lock intelligent unlocking is realized based on mobile terminal
CN106169209A (en) A kind of intelligence public bicycles and management system thereof
CN202090763U (en) Anti-theft alarm device of safety box with function of intelligent positioning
CN107408326A (en) Burglary-resisting system for customer service
CN101667934B (en) Centralized supervision device and supervision method of USB interface equipment networking
US9922473B1 (en) Systems and methods for location-based automated authentication
CN105575008A (en) Intelligent storage cabinet
CN202617350U (en) Mobile phone safety management and control system
CN102324079A (en) Verification system and method
CN105376711A (en) Position prompting method and apparatus of wearable device, and wearable device
CN106228632A (en) A kind of building site Work attendance method and system
CN101719295A (en) Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof
CN105450598A (en) Information identification method, information identification equipment and user terminal
US20110076988A1 (en) System and Method for Identifying and Cross-Referencing Cellular IDS and Biometrical Characteristics
CN108924759A (en) Identify the method, apparatus and system of mobile generator
CN101945123A (en) RFID mobile phone and combination key technology-based authenticity identification method
CN205788363U (en) A kind of multiple authentication Gate-ban Monitoring System of Home House
CN107665313A (en) Sensitive information methods of exhibiting, device, storage medium and computer equipment
US9306749B2 (en) Method of biometric authentication, corresponding authentication system and program
CN206193989U (en) Lock and vehicle
CN214752023U (en) Fingerprint acquisition device and fingerprint management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant