CN108776764A - A kind of traffic safety management and supervisory systems and its application method - Google Patents

A kind of traffic safety management and supervisory systems and its application method Download PDF

Info

Publication number
CN108776764A
CN108776764A CN201810665674.1A CN201810665674A CN108776764A CN 108776764 A CN108776764 A CN 108776764A CN 201810665674 A CN201810665674 A CN 201810665674A CN 108776764 A CN108776764 A CN 108776764A
Authority
CN
China
Prior art keywords
software
traffic
module
management
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810665674.1A
Other languages
Chinese (zh)
Inventor
周春桂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong Sen Ya Business Service Co Ltd
Original Assignee
Nantong Sen Ya Business Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nantong Sen Ya Business Service Co Ltd filed Critical Nantong Sen Ya Business Service Co Ltd
Priority to CN201810665674.1A priority Critical patent/CN108776764A/en
Publication of CN108776764A publication Critical patent/CN108776764A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/53Decompilation; Disassembly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Abstract

The present invention relates to a kind of traffic safety management and supervisory systems.It can effectively improve the dynamics of information security and business supervision, while improve the safety of traffic management information system.It includes traffic administration business core information subsystem, it is characterised in that:It further includes traffic management software safety management and supervision subsystem, the traffic administration business core information subsystem is embedded to be equipped with software security and supervision probe module, the traffic management software safety management specifically includes communication management module with supervision subsystem, function module, central database, the function module includes software security publication authorization module, running software monitoring modular, traffic administration business administration module, the communication management module includes data reception module, instruction sending module, white list service module, the traffic administration business core information subsystem connects the communication management module, the communication management module is separately connected software security publication authorization module, running software monitoring modular, traffic administration business administration module, the function module connects the central database.

Description

A kind of traffic safety management and supervisory systems and its application method
Technical field
The present invention relates to national traffic management applications operating information system technical field, specially a kind of traffic safety management With supervisory systems, the present invention also provides the application methods of the system.
Background technology
Each operating information system of whole nation traffic administration has built up and has obtained scale application, whole nation peace at present The minicomputer of kernel software is filled up to more than 350, PC server is up to more than 6500, and software installation point reaches more than 1200, on the whole System run all right, function are reliable.But previous software is laying particular emphasis on the agility of operation, traffic administration service logic just True property, the real-time of data transmission, and the dynamics supervised to information security and business is little, simultaneously as some criminals Kernel software is stolen using various means and issues use privately, and can carry out the weakness of decompiling using Java code, is repaiied privately Change the program code of key logic, and data falsification, seek unlawful interests, seriously endangers the peace of traffic management information system Entirely.For this purpose, the Ministry of Public Security proposes urgent requirement to the safety reinforcing of traffic administration core business software, there is an urgent need to establish The mechanism of a whole set of software safety management uses for realizing being registered to each business software mandate of traffic administration industry, real Now to carrying out security hardening on the every aspect of application software.At the same time it is also necessary to ensure core business software stable operation, It cannot modify substantially to core business software in principle.
Invention content
In view of the above-mentioned problems, the present invention provides a kind of traffic safety management and supervisory systems, information can be effectively improved The dynamics of safety and business supervision, while improving the safety of traffic management information system.
A kind of traffic safety management and supervisory systems, technical solution are such:It includes traffic administration business core Information subsystem, it is characterised in that:It further includes traffic management software safety management and supervision subsystem, the traffic administration industry Business core information subsystem is embedded to be equipped with software security and supervision probe module, the traffic management software safety management and prison Pipe subsystem specifically includes communication management module, function module, central database, and the function module includes software security publication Authorization module, running software monitoring modular, traffic administration business administration module, the communication management module includes data reception Block, instruction sending module, white list service module, the traffic administration business core information subsystem connect the communication management Module, the communication management module are separately connected software security publication authorization module, running software monitoring modular, traffic administration industry Business administration module, the function module connect the central database.
It is further characterized by:The software security publication authorization module monitors the traffic management software safety management With the mount message of supervision subsystem, the traffic management software safety management passes through described with the mount message for supervising subsystem Communication management module is sent to the software security publication authorization module, and the software security issues authorization module by feedback information It is sent to the traffic management software safety management and supervision subsystem by the communication management module;
The running software monitoring modular monitors the traffic management software safety management to be believed with the operation for supervising subsystem Breath, the traffic management software safety management with supervision subsystem where server operation information by the software security with It supervises probe module and carries out information monitoring, the data after described information monitoring are transferred into the communication management module, described logical News management module monitors the data transmission received to the running software monitoring modular, the running software monitoring modular pair Suffered data are handled, and corresponding rejection or receiving processing are made;
The traffic administration business administration module monitors the traffic management software safety management and supervises the different of subsystem Normal business datum, the software security are provided with service exception setup module with supervision probe module, and monitoring abnormal traffic will Abnormal data is sent to the traffic administration business administration module by its typing abnormal data by the communication management module, The traffic administration business administration module combination statistical graph is for statistical analysis to abnormal traffic data, finds out exception and handles industry The installation point of business;
The software security is specifically included with supervision probe module and is carried out to java class file modification using md5 encryption algorithm Monitoring, control Java decompilings, local white list black list, heartbeat mechanism;
The traffic administration business core information subsystem specifically includes motor vehicle register system, driver manages system, Traffic accident transaction system, traffic offence processing system.
A kind of application method of traffic safety management and supervisory systems, it is characterised in that:Pass through traffic management software safety The traffic administration business core information subsystem of management and the software security publication authorization module control installation point of supervision subsystem Normal mounting, and record its installation data, when traffic administration business core information subsystem is run, pass through its internal software Safety limits the client in local white list with supervision probe module and is operated, and is monitored to operation, while will count According to the running software monitoring modular for reaching traffic management software safety management together with monitoring data with supervising subsystem, software peace It is preset with service exception setting with supervision probe module entirely, when it monitors abnormal traffic, by the data transmission of abnormal traffic To the traffic administration business administration module of traffic administration software safety management and supervision subsystem.
It is further characterized by:
When installing traffic administration business core information subsystem, user files an application, and fills in filing and registration information table, software Safety publication authorization module according to filing and registration information table generate software installation key, application user according to software installation key into The registration of row software, software security issue authorization module automatic collection transmission data library server identification, application server identifier The information such as information, software version, software security issue the correctness that authorization module checks installation key according to the information acquired, Generate calculation in the write-in of the information such as the formal key of software, and database information, Application Server information and the software version of installation According to library, while formal key is automatically transmitted to by network the installation point of traffic administration business core information subsystem, installation Point records the formal key of database information, Application Server information and software of registration to local cipher table in a manner of encrypted In;
When traffic administration business core information subsystem is run, it is by embedded traffic administration business core information point of installing The software security of system monitors mould with supervision probe module and traffic management software safety management and the running software of supervision subsystem Block monitoring operation comprising following content:
(1) monitoring is distorted in the Java decompilings of software security and supervision probe module, when business software is issued, is passed through Md5 encryption algorithm generates encryption information table, and by the encryption information table, whether the MD5 values of verification java class file change, if There are the record that java class file MD5 values change, the java class filenames of manipulation of record;
(2) the critical storage process of software security and supervision probe module illegally calls control, passes through software security and prison Whether pipe probe module judges the information of caller in local key list service before executing business software storing process every time In device range;
(3) software security has heartbeat mechanism with supervision probe module foundation, and mould is monitored to running software in each of which period Block sends signal, it is ensured that traffic administration business core information subsystem is in operating status;
(4) transmission security controls, the white list information of running software monitoring modular timing acquisition central database, and leads to The storing process that the judgement transmission data business software identity legitimacy provided is provided, to being sent to running software monitoring by installation point The traffic management information of module carries out authentication, verifies the legitimacy of installation point, and verify point of safes database server mark Know the consistency of information, middleware application server ip address information is whether in white list service in public security net, it is ensured that traffic Management information must be transmitted by the installation point licensed, the installation point rejection of unauthorized use;
Software security is preset with service exception setting with supervision probe module, and setting for service exception is arranged when user is initial It sets, setting is adjusted also with the demand of business, after being provided with, during business carries out, abnormal traffic occur When, software security can be by the data transmission of abnormal traffic to traffic administration software safety management and supervision point with supervision probe module The traffic administration business administration module of system, traffic administration business administration module combination statistical graph carry out abnormal traffic data The installation point of abnormal transacting business is found out in statistical analysis.
After system using the present invention, traffic administration business core information subsystem is embedded to be equipped with software security and supervision Probe module, traffic management software safety management and software security publication authorization module, the running software in supervision subsystem are supervised Module, traffic administration business administration module are surveyed, wherein software security publication authorization module ensures traffic administration business core information In the mount message whole typing central database of subsystem, its information security and the dynamics that can supervise are ensured on source It improves;Software security is used interchangeably with supervision probe module and the cooperation of running software monitoring modular, improves traffic management information The safety of system;Traffic administration business administration module is used interchangeably with the cooperation of running software monitoring modular, effectively improves information peace The dynamics of complete and business supervision.
Description of the drawings
Fig. 1 is the block diagram of the present invention.
Specific implementation mode
See that Fig. 1, the present invention include traffic administration business core information subsystem, traffic management software safety management and supervision Subsystem, traffic administration business core information subsystem specifically includes motor vehicle register system, driver manages system, traffic thing Therefore processing system, traffic offence processing system, traffic administration business core information subsystem is embedded to be equipped with software security and prison Pipe probe module, traffic management software safety management specifically include communication management module, function module, center with supervision subsystem Database, function module include software security publication authorization module, running software monitoring modular, traffic administration business supervision mould Block, communication management module include data reception module, instruction sending module, white list service module, traffic administration business core Information subsystem connecting communication management module, communication management module are separately connected software security publication authorization module, running software Monitoring modular, traffic administration business administration module, function module connect central database;
Software security issues the mount message of authorization module monitoring traffic management software safety management and supervision subsystem, hands over Siphunculus reason software safety management and the mount message for supervising subsystem are sent to software security publication by communication management module and award Module is weighed, feedback information is sent to traffic management software bursting tube by software security publication authorization module by communication management module Reason and supervision subsystem;
Running software monitoring modular monitors traffic management software safety management and supervises the operation information of subsystem, traffic pipe The operation information of server is carried out by software security and supervision probe module where managing software safety management and supervising subsystem Information monitoring, the data after information monitoring are transferred into communication management module, the data transmission that communication management module will receive It is monitored to running software monitoring modular, running software monitoring modular handles suffered data, makes corresponding rejection Or receiving processing;
Traffic administration business administration module monitors traffic management software safety management and supervises the abnormal traffic number of subsystem According to software security is provided with service exception setup module with supervision probe module, monitors abnormal traffic by its typing exception number According to abnormal data is sent to traffic administration business administration module, traffic administration business administration module by communication management module It is for statistical analysis to abnormal traffic data in conjunction with statistical graph, find out the installation point of abnormal transacting business;
Software security is specifically included with supervision probe module and is supervised to java class file modification using md5 encryption algorithm It surveys, control Java decompilings, local white list black list, heartbeat mechanism;
Its application method is as follows:
When installing traffic administration business core information subsystem, user files an application, and fills in filing and registration information table, software Safety publication authorization module according to filing and registration information table generate software installation key, application user according to software installation key into The registration of row software, software security issue authorization module automatic collection transmission data library server identification, application server identifier The information such as information, software version, software security issue the correctness that authorization module checks installation key according to the information acquired, Generate calculation in the write-in of the information such as the formal key of software, and database information, Application Server information and the software version of installation According to library, while formal key is automatically transmitted to by network the installation point of traffic administration business core information subsystem, installation Point records the formal key of database information, Application Server information and software of registration to local cipher table in a manner of encrypted In;
When traffic administration business core information subsystem is run, it is by embedded traffic administration business core information point of installing The software security of system monitors mould with supervision probe module and traffic management software safety management and the running software of supervision subsystem Block monitoring operation comprising following content:
(1) monitoring is distorted in the Java decompilings of software security and supervision probe module, when business software is issued, is passed through Md5 encryption algorithm generates encryption information table, and by the encryption information table, whether the MD5 values of verification java class file change, if There are the record that java class file MD5 values change, the java class filenames of manipulation of record;
(2) the critical storage process of software security and supervision probe module illegally calls control, passes through software security and prison Whether pipe probe module judges the information of caller in local key list service before executing business software storing process every time In device range;
(3) software security has heartbeat mechanism with supervision probe module foundation, and mould is monitored to running software in each of which period Block sends signal, it is ensured that traffic administration business core information subsystem is in operating status;
(4) transmission security controls, the white list information of running software monitoring modular timing acquisition central database, and leads to The storing process that the judgement transmission data business software identity legitimacy provided is provided, to being sent to running software monitoring by installation point The traffic management information of module carries out authentication, verifies the legitimacy of installation point, and verify point of safes database server mark Know the consistency of information, middleware application server ip address information is whether in white list service in public security net, it is ensured that traffic Management information must be transmitted by the installation point licensed, the installation point rejection of unauthorized use;
Software security is preset with service exception setting with supervision probe module, and setting for service exception is arranged when user is initial It sets, setting is adjusted also with the demand of business, after being provided with, during business carries out, abnormal traffic occur When, software security can be by the data transmission of abnormal traffic to traffic administration software safety management and supervision point with supervision probe module The traffic administration business administration module of system, traffic administration business administration module combination statistical graph carry out abnormal traffic data The installation point of abnormal transacting business is found out in statistical analysis.

Claims (8)

1. a kind of traffic safety management and supervisory systems comprising traffic administration business core information subsystem, it is characterised in that: It further includes traffic management software safety management and supervision subsystem, the embedded peace of the traffic administration business core information subsystem Equipped with software security and supervision probe module, the traffic management software safety management specifically includes communication pipe with supervision subsystem Module, function module, central database are managed, the function module includes software security publication authorization module, running software monitoring Module, traffic administration business administration module, the communication management module include data reception module, instruction sending module, white name Single service module, the traffic administration business core information subsystem connect the communication management module, the communication management mould Block is separately connected software security publication authorization module, running software monitoring modular, traffic administration business administration module, the function Module connects the central database;Software security publication authorization module monitor the traffic management software safety management with The mount message of subsystem is supervised, the traffic management software safety management passes through described logical with the mount message for supervising subsystem News management module is sent to the software security publication authorization module, and the software security publication authorization module leads to feedback information It crosses the communication management module and is sent to the traffic management software safety management and supervision subsystem;The running software Monitoring modular monitors the traffic management software safety management and supervises the operation information of subsystem, the traffic management software peace It manages entirely and supervises the operation information of subsystem place server by the software security and supervise probe module into row information Monitoring, the data after described information monitoring are transferred into the communication management module, and the communication management module will receive Data transmission to the running software monitoring modular monitors, and the running software monitoring modular is at the data that are received Reason makes corresponding rejection or receiving processing.
2. a kind of traffic safety management according to claim 1 and supervisory systems, it is characterised in that:The traffic administration industry Business administration module monitors the traffic management software safety management and supervises the abnormal traffic data of subsystem, the software security Supervision probe module is provided with service exception setup module, monitoring abnormal traffic is by its typing abnormal data, by abnormal number It is sent to the traffic administration business administration module, the traffic administration business administration module according to by the communication management module It is for statistical analysis to abnormal traffic data in conjunction with statistical graph, find out the installation point of abnormal transacting business.
3. a kind of traffic safety management according to claim 1 and supervisory systems, it is characterised in that:The software security with Supervision probe module, which is specifically included, to be monitored java class file modification using md5 encryption algorithm, controls Java decompilings, sheet Ground white list black list, heartbeat mechanism.
4. a kind of traffic safety management according to claim 1 and supervisory systems, it is characterised in that:The traffic administration industry Business core information subsystem specifically include motor vehicle register system, driver manage system, traffic accident transaction system, traffic disobey Method processing system.
5. the application method of a kind of traffic safety management and supervisory systems, it is characterised in that:Software security issues authorization module prison It controls traffic management software safety management and supervises the mount message of subsystem, the traffic management software safety management and supervision point The mount message of system is sent to the software security by communication management module and issues authorization module, the software security publication Feedback information is sent to the traffic management software safety management and supervision point by authorization module by the communication management module System;Running software monitoring modular monitors the traffic management software safety management and supervises the operation information of subsystem, described Traffic management software safety management and the operation information of server where supervision subsystem are visited by the software security and supervision Pin module carries out information monitoring, and the data after described information monitoring are transferred into the communication management module, the communication management Module monitors the data transmission received to the running software monitoring modular, and the running software monitoring modular is to suffered Data handled, make corresponding reject or receiving processing;Pass through traffic management software safety management and supervision subsystem Software security publication authorization module control installation point traffic administration business core information subsystem normal mounting, and record Its installation data when traffic administration business core information subsystem is run, passes through its internal software security and supervision probe mould The client that block limits in local white list is operated, and is monitored to operation, while together by data and monitoring data It reaches traffic management software safety management and supervises the running software monitoring modular of subsystem, software security and supervision probe module It is preset with service exception setting, when it monitors abnormal traffic, the data transmission of abnormal traffic to traffic management software is pacified The traffic administration business administration module of full management and supervision subsystem.
6. the application method of a kind of traffic safety management and supervisory systems according to claim 5, it is characterised in that:Installation When traffic administration business core information subsystem, user files an application, and fills in filing and registration information table, and software security publication authorizes Module generates software installation key according to filing and registration information table, and application user carries out the note of software according to software installation key Volume, software security issue authorization module automatic collection transmission data library server identification, application server identifier information, software version This information, software security issue the correctness that authorization module checks installation key according to the information acquired, and it is formal to generate software Central database is written in key, and the database information of installation, Application Server information and software version information, while formal Key is automatically transmitted to the installation point of traffic administration business core information subsystem by network, and installation point is remembered in a manner of encrypted In the database information, Application Server information and software formal key to local cipher table of recording registration.
7. the application method of a kind of traffic safety management and supervisory systems according to claim 6, it is characterised in that:Traffic When management business core information subsystem is run, pass through the embedded software security for installing traffic administration business core information subsystem It monitors and runs with the running software monitoring modular of supervision probe module and traffic management software safety management and supervision subsystem, Including following content:
(1) monitoring is distorted in the Java decompilings of software security and supervision probe module, when business software is issued, by MD5 plus Close algorithm generates encryption information table, and by the encryption information table, whether the MD5 values of verification java class file change, if there is The record that java class file MD5 values change, the java class filename of manipulation of record;
(2) the critical storage process of software security and supervision probe module illegally calls control, is visited by software security and supervision Whether pin module judges the information of caller in local key list server model before executing business software storing process every time In enclosing;
(3) software security has heartbeat mechanism with supervision probe module foundation, is sent out to running software monitoring modular in each of which period The number of delivering letters, it is ensured that traffic administration business core information subsystem is in operating status;
(4) transmission security controls, the white list information of running software monitoring modular timing acquisition central database, and by carrying The storing process of the judgement transmission data business software identity legitimacy of confession, to being sent to running software monitoring modular by installation point Traffic management information carry out authentication, verify the legitimacy of installation point, and verify point of safes database server mark letter The consistency of breath, whether middleware application server ip address information is in white list service in public security net, it is ensured that traffic administration Information must be transmitted by the installation point licensed, the installation point rejection of unauthorized use.
8. the application method of a kind of traffic safety management and supervisory systems according to claim 7, it is characterised in that:Software Safety is preset with service exception setting with supervision probe module, the setting of service exception is arranged when user is initial, also with industry The demand of business is adjusted setting, after being provided with, during business carries out, when there is abnormal traffic, software security with Supervising probe module can be by the traffic pipe of the data transmission of abnormal traffic to traffic administration software safety management and supervision subsystem Reason business administration module, traffic administration business administration module combination statistical graph is for statistical analysis to abnormal traffic data, looks for Go out the installation point of abnormal transacting business.
CN201810665674.1A 2018-06-26 2018-06-26 A kind of traffic safety management and supervisory systems and its application method Withdrawn CN108776764A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810665674.1A CN108776764A (en) 2018-06-26 2018-06-26 A kind of traffic safety management and supervisory systems and its application method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810665674.1A CN108776764A (en) 2018-06-26 2018-06-26 A kind of traffic safety management and supervisory systems and its application method

Publications (1)

Publication Number Publication Date
CN108776764A true CN108776764A (en) 2018-11-09

Family

ID=64026366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810665674.1A Withdrawn CN108776764A (en) 2018-06-26 2018-06-26 A kind of traffic safety management and supervisory systems and its application method

Country Status (1)

Country Link
CN (1) CN108776764A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909345A (en) * 2019-12-02 2020-03-24 中国银行股份有限公司 Tamper-proof method and system for Java system open source software
CN112787836A (en) * 2019-11-07 2021-05-11 比亚迪股份有限公司 Information security network topology and method for implementing information security

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112787836A (en) * 2019-11-07 2021-05-11 比亚迪股份有限公司 Information security network topology and method for implementing information security
CN110909345A (en) * 2019-12-02 2020-03-24 中国银行股份有限公司 Tamper-proof method and system for Java system open source software
CN110909345B (en) * 2019-12-02 2022-03-22 中国银行股份有限公司 Tamper-proof method and system for Java system open source software

Similar Documents

Publication Publication Date Title
US8356342B2 (en) Method and system for issuing a kill sequence for a token
CN110598434B (en) House information processing method and device based on blockchain network, electronic equipment and storage medium
CN108259497B (en) System and method for fuel dispenser security
CN112818328A (en) Multi-system authority management method, device, equipment and storage medium
CN109274650B (en) Electronic image retrieval management system and method
CN111625870B (en) Block chain-based security audit method, system and storage medium
CN101201884A (en) Software component, software component management method, and software component management system
CN104464114A (en) System and method for managing and monitoring safety of application of financial terminals
CN107832602B (en) Unified electronic seal system based on identification
CN112543184B (en) Block chain-based equipment authentication activation method
CN108776764A (en) A kind of traffic safety management and supervisory systems and its application method
CN114925141B (en) Cloud primary automation deployment management system and method based on block chain
CN115664691B (en) Communication security car networking system
CN108388779A (en) A kind of Portable Automatic stamper machine and management system and its management control method
CN108540335B (en) Management method and management device for equipment analysis report
CN112702419B (en) Data processing method, device, equipment and storage medium based on block chain
CN101807276B (en) Security management and supervision system of traffic management software and application method thereof
CN102752308A (en) Network-based digital certificate comprehensive service providing system and implementation method thereof
CN110851837A (en) Self-service equipment based on trusted computing, and security management system and method thereof
CN114154965A (en) Collaborative law enforcement and case handling management method and system based on block chain
CN114189800A (en) Vehicle driving track sharing method and device, equipment and storage medium
CN114266080A (en) Data integrity protection method and system based on state cryptographic algorithm
CN113472749A (en) Method for preventing unauthorized self-service machine terminal from accessing B/S architecture system
JP2016071644A (en) License management method and license management system
CN113806778B (en) Data management method, system and storage medium based on big data platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20181109

WW01 Invention patent application withdrawn after publication