CN108776764A - A kind of traffic safety management and supervisory systems and its application method - Google Patents
A kind of traffic safety management and supervisory systems and its application method Download PDFInfo
- Publication number
- CN108776764A CN108776764A CN201810665674.1A CN201810665674A CN108776764A CN 108776764 A CN108776764 A CN 108776764A CN 201810665674 A CN201810665674 A CN 201810665674A CN 108776764 A CN108776764 A CN 108776764A
- Authority
- CN
- China
- Prior art keywords
- software
- traffic
- module
- management
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/53—Decompilation; Disassembly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Abstract
The present invention relates to a kind of traffic safety management and supervisory systems.It can effectively improve the dynamics of information security and business supervision, while improve the safety of traffic management information system.It includes traffic administration business core information subsystem, it is characterised in that:It further includes traffic management software safety management and supervision subsystem, the traffic administration business core information subsystem is embedded to be equipped with software security and supervision probe module, the traffic management software safety management specifically includes communication management module with supervision subsystem, function module, central database, the function module includes software security publication authorization module, running software monitoring modular, traffic administration business administration module, the communication management module includes data reception module, instruction sending module, white list service module, the traffic administration business core information subsystem connects the communication management module, the communication management module is separately connected software security publication authorization module, running software monitoring modular, traffic administration business administration module, the function module connects the central database.
Description
Technical field
The present invention relates to national traffic management applications operating information system technical field, specially a kind of traffic safety management
With supervisory systems, the present invention also provides the application methods of the system.
Background technology
Each operating information system of whole nation traffic administration has built up and has obtained scale application, whole nation peace at present
The minicomputer of kernel software is filled up to more than 350, PC server is up to more than 6500, and software installation point reaches more than 1200, on the whole
System run all right, function are reliable.But previous software is laying particular emphasis on the agility of operation, traffic administration service logic just
True property, the real-time of data transmission, and the dynamics supervised to information security and business is little, simultaneously as some criminals
Kernel software is stolen using various means and issues use privately, and can carry out the weakness of decompiling using Java code, is repaiied privately
Change the program code of key logic, and data falsification, seek unlawful interests, seriously endangers the peace of traffic management information system
Entirely.For this purpose, the Ministry of Public Security proposes urgent requirement to the safety reinforcing of traffic administration core business software, there is an urgent need to establish
The mechanism of a whole set of software safety management uses for realizing being registered to each business software mandate of traffic administration industry, real
Now to carrying out security hardening on the every aspect of application software.At the same time it is also necessary to ensure core business software stable operation,
It cannot modify substantially to core business software in principle.
Invention content
In view of the above-mentioned problems, the present invention provides a kind of traffic safety management and supervisory systems, information can be effectively improved
The dynamics of safety and business supervision, while improving the safety of traffic management information system.
A kind of traffic safety management and supervisory systems, technical solution are such:It includes traffic administration business core
Information subsystem, it is characterised in that:It further includes traffic management software safety management and supervision subsystem, the traffic administration industry
Business core information subsystem is embedded to be equipped with software security and supervision probe module, the traffic management software safety management and prison
Pipe subsystem specifically includes communication management module, function module, central database, and the function module includes software security publication
Authorization module, running software monitoring modular, traffic administration business administration module, the communication management module includes data reception
Block, instruction sending module, white list service module, the traffic administration business core information subsystem connect the communication management
Module, the communication management module are separately connected software security publication authorization module, running software monitoring modular, traffic administration industry
Business administration module, the function module connect the central database.
It is further characterized by:The software security publication authorization module monitors the traffic management software safety management
With the mount message of supervision subsystem, the traffic management software safety management passes through described with the mount message for supervising subsystem
Communication management module is sent to the software security publication authorization module, and the software security issues authorization module by feedback information
It is sent to the traffic management software safety management and supervision subsystem by the communication management module;
The running software monitoring modular monitors the traffic management software safety management to be believed with the operation for supervising subsystem
Breath, the traffic management software safety management with supervision subsystem where server operation information by the software security with
It supervises probe module and carries out information monitoring, the data after described information monitoring are transferred into the communication management module, described logical
News management module monitors the data transmission received to the running software monitoring modular, the running software monitoring modular pair
Suffered data are handled, and corresponding rejection or receiving processing are made;
The traffic administration business administration module monitors the traffic management software safety management and supervises the different of subsystem
Normal business datum, the software security are provided with service exception setup module with supervision probe module, and monitoring abnormal traffic will
Abnormal data is sent to the traffic administration business administration module by its typing abnormal data by the communication management module,
The traffic administration business administration module combination statistical graph is for statistical analysis to abnormal traffic data, finds out exception and handles industry
The installation point of business;
The software security is specifically included with supervision probe module and is carried out to java class file modification using md5 encryption algorithm
Monitoring, control Java decompilings, local white list black list, heartbeat mechanism;
The traffic administration business core information subsystem specifically includes motor vehicle register system, driver manages system,
Traffic accident transaction system, traffic offence processing system.
A kind of application method of traffic safety management and supervisory systems, it is characterised in that:Pass through traffic management software safety
The traffic administration business core information subsystem of management and the software security publication authorization module control installation point of supervision subsystem
Normal mounting, and record its installation data, when traffic administration business core information subsystem is run, pass through its internal software
Safety limits the client in local white list with supervision probe module and is operated, and is monitored to operation, while will count
According to the running software monitoring modular for reaching traffic management software safety management together with monitoring data with supervising subsystem, software peace
It is preset with service exception setting with supervision probe module entirely, when it monitors abnormal traffic, by the data transmission of abnormal traffic
To the traffic administration business administration module of traffic administration software safety management and supervision subsystem.
It is further characterized by:
When installing traffic administration business core information subsystem, user files an application, and fills in filing and registration information table, software
Safety publication authorization module according to filing and registration information table generate software installation key, application user according to software installation key into
The registration of row software, software security issue authorization module automatic collection transmission data library server identification, application server identifier
The information such as information, software version, software security issue the correctness that authorization module checks installation key according to the information acquired,
Generate calculation in the write-in of the information such as the formal key of software, and database information, Application Server information and the software version of installation
According to library, while formal key is automatically transmitted to by network the installation point of traffic administration business core information subsystem, installation
Point records the formal key of database information, Application Server information and software of registration to local cipher table in a manner of encrypted
In;
When traffic administration business core information subsystem is run, it is by embedded traffic administration business core information point of installing
The software security of system monitors mould with supervision probe module and traffic management software safety management and the running software of supervision subsystem
Block monitoring operation comprising following content:
(1) monitoring is distorted in the Java decompilings of software security and supervision probe module, when business software is issued, is passed through
Md5 encryption algorithm generates encryption information table, and by the encryption information table, whether the MD5 values of verification java class file change, if
There are the record that java class file MD5 values change, the java class filenames of manipulation of record;
(2) the critical storage process of software security and supervision probe module illegally calls control, passes through software security and prison
Whether pipe probe module judges the information of caller in local key list service before executing business software storing process every time
In device range;
(3) software security has heartbeat mechanism with supervision probe module foundation, and mould is monitored to running software in each of which period
Block sends signal, it is ensured that traffic administration business core information subsystem is in operating status;
(4) transmission security controls, the white list information of running software monitoring modular timing acquisition central database, and leads to
The storing process that the judgement transmission data business software identity legitimacy provided is provided, to being sent to running software monitoring by installation point
The traffic management information of module carries out authentication, verifies the legitimacy of installation point, and verify point of safes database server mark
Know the consistency of information, middleware application server ip address information is whether in white list service in public security net, it is ensured that traffic
Management information must be transmitted by the installation point licensed, the installation point rejection of unauthorized use;
Software security is preset with service exception setting with supervision probe module, and setting for service exception is arranged when user is initial
It sets, setting is adjusted also with the demand of business, after being provided with, during business carries out, abnormal traffic occur
When, software security can be by the data transmission of abnormal traffic to traffic administration software safety management and supervision point with supervision probe module
The traffic administration business administration module of system, traffic administration business administration module combination statistical graph carry out abnormal traffic data
The installation point of abnormal transacting business is found out in statistical analysis.
After system using the present invention, traffic administration business core information subsystem is embedded to be equipped with software security and supervision
Probe module, traffic management software safety management and software security publication authorization module, the running software in supervision subsystem are supervised
Module, traffic administration business administration module are surveyed, wherein software security publication authorization module ensures traffic administration business core information
In the mount message whole typing central database of subsystem, its information security and the dynamics that can supervise are ensured on source
It improves;Software security is used interchangeably with supervision probe module and the cooperation of running software monitoring modular, improves traffic management information
The safety of system;Traffic administration business administration module is used interchangeably with the cooperation of running software monitoring modular, effectively improves information peace
The dynamics of complete and business supervision.
Description of the drawings
Fig. 1 is the block diagram of the present invention.
Specific implementation mode
See that Fig. 1, the present invention include traffic administration business core information subsystem, traffic management software safety management and supervision
Subsystem, traffic administration business core information subsystem specifically includes motor vehicle register system, driver manages system, traffic thing
Therefore processing system, traffic offence processing system, traffic administration business core information subsystem is embedded to be equipped with software security and prison
Pipe probe module, traffic management software safety management specifically include communication management module, function module, center with supervision subsystem
Database, function module include software security publication authorization module, running software monitoring modular, traffic administration business supervision mould
Block, communication management module include data reception module, instruction sending module, white list service module, traffic administration business core
Information subsystem connecting communication management module, communication management module are separately connected software security publication authorization module, running software
Monitoring modular, traffic administration business administration module, function module connect central database;
Software security issues the mount message of authorization module monitoring traffic management software safety management and supervision subsystem, hands over
Siphunculus reason software safety management and the mount message for supervising subsystem are sent to software security publication by communication management module and award
Module is weighed, feedback information is sent to traffic management software bursting tube by software security publication authorization module by communication management module
Reason and supervision subsystem;
Running software monitoring modular monitors traffic management software safety management and supervises the operation information of subsystem, traffic pipe
The operation information of server is carried out by software security and supervision probe module where managing software safety management and supervising subsystem
Information monitoring, the data after information monitoring are transferred into communication management module, the data transmission that communication management module will receive
It is monitored to running software monitoring modular, running software monitoring modular handles suffered data, makes corresponding rejection
Or receiving processing;
Traffic administration business administration module monitors traffic management software safety management and supervises the abnormal traffic number of subsystem
According to software security is provided with service exception setup module with supervision probe module, monitors abnormal traffic by its typing exception number
According to abnormal data is sent to traffic administration business administration module, traffic administration business administration module by communication management module
It is for statistical analysis to abnormal traffic data in conjunction with statistical graph, find out the installation point of abnormal transacting business;
Software security is specifically included with supervision probe module and is supervised to java class file modification using md5 encryption algorithm
It surveys, control Java decompilings, local white list black list, heartbeat mechanism;
Its application method is as follows:
When installing traffic administration business core information subsystem, user files an application, and fills in filing and registration information table, software
Safety publication authorization module according to filing and registration information table generate software installation key, application user according to software installation key into
The registration of row software, software security issue authorization module automatic collection transmission data library server identification, application server identifier
The information such as information, software version, software security issue the correctness that authorization module checks installation key according to the information acquired,
Generate calculation in the write-in of the information such as the formal key of software, and database information, Application Server information and the software version of installation
According to library, while formal key is automatically transmitted to by network the installation point of traffic administration business core information subsystem, installation
Point records the formal key of database information, Application Server information and software of registration to local cipher table in a manner of encrypted
In;
When traffic administration business core information subsystem is run, it is by embedded traffic administration business core information point of installing
The software security of system monitors mould with supervision probe module and traffic management software safety management and the running software of supervision subsystem
Block monitoring operation comprising following content:
(1) monitoring is distorted in the Java decompilings of software security and supervision probe module, when business software is issued, is passed through
Md5 encryption algorithm generates encryption information table, and by the encryption information table, whether the MD5 values of verification java class file change, if
There are the record that java class file MD5 values change, the java class filenames of manipulation of record;
(2) the critical storage process of software security and supervision probe module illegally calls control, passes through software security and prison
Whether pipe probe module judges the information of caller in local key list service before executing business software storing process every time
In device range;
(3) software security has heartbeat mechanism with supervision probe module foundation, and mould is monitored to running software in each of which period
Block sends signal, it is ensured that traffic administration business core information subsystem is in operating status;
(4) transmission security controls, the white list information of running software monitoring modular timing acquisition central database, and leads to
The storing process that the judgement transmission data business software identity legitimacy provided is provided, to being sent to running software monitoring by installation point
The traffic management information of module carries out authentication, verifies the legitimacy of installation point, and verify point of safes database server mark
Know the consistency of information, middleware application server ip address information is whether in white list service in public security net, it is ensured that traffic
Management information must be transmitted by the installation point licensed, the installation point rejection of unauthorized use;
Software security is preset with service exception setting with supervision probe module, and setting for service exception is arranged when user is initial
It sets, setting is adjusted also with the demand of business, after being provided with, during business carries out, abnormal traffic occur
When, software security can be by the data transmission of abnormal traffic to traffic administration software safety management and supervision point with supervision probe module
The traffic administration business administration module of system, traffic administration business administration module combination statistical graph carry out abnormal traffic data
The installation point of abnormal transacting business is found out in statistical analysis.
Claims (8)
1. a kind of traffic safety management and supervisory systems comprising traffic administration business core information subsystem, it is characterised in that:
It further includes traffic management software safety management and supervision subsystem, the embedded peace of the traffic administration business core information subsystem
Equipped with software security and supervision probe module, the traffic management software safety management specifically includes communication pipe with supervision subsystem
Module, function module, central database are managed, the function module includes software security publication authorization module, running software monitoring
Module, traffic administration business administration module, the communication management module include data reception module, instruction sending module, white name
Single service module, the traffic administration business core information subsystem connect the communication management module, the communication management mould
Block is separately connected software security publication authorization module, running software monitoring modular, traffic administration business administration module, the function
Module connects the central database;Software security publication authorization module monitor the traffic management software safety management with
The mount message of subsystem is supervised, the traffic management software safety management passes through described logical with the mount message for supervising subsystem
News management module is sent to the software security publication authorization module, and the software security publication authorization module leads to feedback information
It crosses the communication management module and is sent to the traffic management software safety management and supervision subsystem;The running software
Monitoring modular monitors the traffic management software safety management and supervises the operation information of subsystem, the traffic management software peace
It manages entirely and supervises the operation information of subsystem place server by the software security and supervise probe module into row information
Monitoring, the data after described information monitoring are transferred into the communication management module, and the communication management module will receive
Data transmission to the running software monitoring modular monitors, and the running software monitoring modular is at the data that are received
Reason makes corresponding rejection or receiving processing.
2. a kind of traffic safety management according to claim 1 and supervisory systems, it is characterised in that:The traffic administration industry
Business administration module monitors the traffic management software safety management and supervises the abnormal traffic data of subsystem, the software security
Supervision probe module is provided with service exception setup module, monitoring abnormal traffic is by its typing abnormal data, by abnormal number
It is sent to the traffic administration business administration module, the traffic administration business administration module according to by the communication management module
It is for statistical analysis to abnormal traffic data in conjunction with statistical graph, find out the installation point of abnormal transacting business.
3. a kind of traffic safety management according to claim 1 and supervisory systems, it is characterised in that:The software security with
Supervision probe module, which is specifically included, to be monitored java class file modification using md5 encryption algorithm, controls Java decompilings, sheet
Ground white list black list, heartbeat mechanism.
4. a kind of traffic safety management according to claim 1 and supervisory systems, it is characterised in that:The traffic administration industry
Business core information subsystem specifically include motor vehicle register system, driver manage system, traffic accident transaction system, traffic disobey
Method processing system.
5. the application method of a kind of traffic safety management and supervisory systems, it is characterised in that:Software security issues authorization module prison
It controls traffic management software safety management and supervises the mount message of subsystem, the traffic management software safety management and supervision point
The mount message of system is sent to the software security by communication management module and issues authorization module, the software security publication
Feedback information is sent to the traffic management software safety management and supervision point by authorization module by the communication management module
System;Running software monitoring modular monitors the traffic management software safety management and supervises the operation information of subsystem, described
Traffic management software safety management and the operation information of server where supervision subsystem are visited by the software security and supervision
Pin module carries out information monitoring, and the data after described information monitoring are transferred into the communication management module, the communication management
Module monitors the data transmission received to the running software monitoring modular, and the running software monitoring modular is to suffered
Data handled, make corresponding reject or receiving processing;Pass through traffic management software safety management and supervision subsystem
Software security publication authorization module control installation point traffic administration business core information subsystem normal mounting, and record
Its installation data when traffic administration business core information subsystem is run, passes through its internal software security and supervision probe mould
The client that block limits in local white list is operated, and is monitored to operation, while together by data and monitoring data
It reaches traffic management software safety management and supervises the running software monitoring modular of subsystem, software security and supervision probe module
It is preset with service exception setting, when it monitors abnormal traffic, the data transmission of abnormal traffic to traffic management software is pacified
The traffic administration business administration module of full management and supervision subsystem.
6. the application method of a kind of traffic safety management and supervisory systems according to claim 5, it is characterised in that:Installation
When traffic administration business core information subsystem, user files an application, and fills in filing and registration information table, and software security publication authorizes
Module generates software installation key according to filing and registration information table, and application user carries out the note of software according to software installation key
Volume, software security issue authorization module automatic collection transmission data library server identification, application server identifier information, software version
This information, software security issue the correctness that authorization module checks installation key according to the information acquired, and it is formal to generate software
Central database is written in key, and the database information of installation, Application Server information and software version information, while formal
Key is automatically transmitted to the installation point of traffic administration business core information subsystem by network, and installation point is remembered in a manner of encrypted
In the database information, Application Server information and software formal key to local cipher table of recording registration.
7. the application method of a kind of traffic safety management and supervisory systems according to claim 6, it is characterised in that:Traffic
When management business core information subsystem is run, pass through the embedded software security for installing traffic administration business core information subsystem
It monitors and runs with the running software monitoring modular of supervision probe module and traffic management software safety management and supervision subsystem,
Including following content:
(1) monitoring is distorted in the Java decompilings of software security and supervision probe module, when business software is issued, by MD5 plus
Close algorithm generates encryption information table, and by the encryption information table, whether the MD5 values of verification java class file change, if there is
The record that java class file MD5 values change, the java class filename of manipulation of record;
(2) the critical storage process of software security and supervision probe module illegally calls control, is visited by software security and supervision
Whether pin module judges the information of caller in local key list server model before executing business software storing process every time
In enclosing;
(3) software security has heartbeat mechanism with supervision probe module foundation, is sent out to running software monitoring modular in each of which period
The number of delivering letters, it is ensured that traffic administration business core information subsystem is in operating status;
(4) transmission security controls, the white list information of running software monitoring modular timing acquisition central database, and by carrying
The storing process of the judgement transmission data business software identity legitimacy of confession, to being sent to running software monitoring modular by installation point
Traffic management information carry out authentication, verify the legitimacy of installation point, and verify point of safes database server mark letter
The consistency of breath, whether middleware application server ip address information is in white list service in public security net, it is ensured that traffic administration
Information must be transmitted by the installation point licensed, the installation point rejection of unauthorized use.
8. the application method of a kind of traffic safety management and supervisory systems according to claim 7, it is characterised in that:Software
Safety is preset with service exception setting with supervision probe module, the setting of service exception is arranged when user is initial, also with industry
The demand of business is adjusted setting, after being provided with, during business carries out, when there is abnormal traffic, software security with
Supervising probe module can be by the traffic pipe of the data transmission of abnormal traffic to traffic administration software safety management and supervision subsystem
Reason business administration module, traffic administration business administration module combination statistical graph is for statistical analysis to abnormal traffic data, looks for
Go out the installation point of abnormal transacting business.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810665674.1A CN108776764A (en) | 2018-06-26 | 2018-06-26 | A kind of traffic safety management and supervisory systems and its application method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810665674.1A CN108776764A (en) | 2018-06-26 | 2018-06-26 | A kind of traffic safety management and supervisory systems and its application method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108776764A true CN108776764A (en) | 2018-11-09 |
Family
ID=64026366
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810665674.1A Withdrawn CN108776764A (en) | 2018-06-26 | 2018-06-26 | A kind of traffic safety management and supervisory systems and its application method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108776764A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909345A (en) * | 2019-12-02 | 2020-03-24 | 中国银行股份有限公司 | Tamper-proof method and system for Java system open source software |
CN112787836A (en) * | 2019-11-07 | 2021-05-11 | 比亚迪股份有限公司 | Information security network topology and method for implementing information security |
-
2018
- 2018-06-26 CN CN201810665674.1A patent/CN108776764A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112787836A (en) * | 2019-11-07 | 2021-05-11 | 比亚迪股份有限公司 | Information security network topology and method for implementing information security |
CN110909345A (en) * | 2019-12-02 | 2020-03-24 | 中国银行股份有限公司 | Tamper-proof method and system for Java system open source software |
CN110909345B (en) * | 2019-12-02 | 2022-03-22 | 中国银行股份有限公司 | Tamper-proof method and system for Java system open source software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8356342B2 (en) | Method and system for issuing a kill sequence for a token | |
CN110598434B (en) | House information processing method and device based on blockchain network, electronic equipment and storage medium | |
CN108259497B (en) | System and method for fuel dispenser security | |
CN112818328A (en) | Multi-system authority management method, device, equipment and storage medium | |
CN109274650B (en) | Electronic image retrieval management system and method | |
CN111625870B (en) | Block chain-based security audit method, system and storage medium | |
CN101201884A (en) | Software component, software component management method, and software component management system | |
CN104464114A (en) | System and method for managing and monitoring safety of application of financial terminals | |
CN107832602B (en) | Unified electronic seal system based on identification | |
CN112543184B (en) | Block chain-based equipment authentication activation method | |
CN108776764A (en) | A kind of traffic safety management and supervisory systems and its application method | |
CN114925141B (en) | Cloud primary automation deployment management system and method based on block chain | |
CN115664691B (en) | Communication security car networking system | |
CN108388779A (en) | A kind of Portable Automatic stamper machine and management system and its management control method | |
CN108540335B (en) | Management method and management device for equipment analysis report | |
CN112702419B (en) | Data processing method, device, equipment and storage medium based on block chain | |
CN101807276B (en) | Security management and supervision system of traffic management software and application method thereof | |
CN102752308A (en) | Network-based digital certificate comprehensive service providing system and implementation method thereof | |
CN110851837A (en) | Self-service equipment based on trusted computing, and security management system and method thereof | |
CN114154965A (en) | Collaborative law enforcement and case handling management method and system based on block chain | |
CN114189800A (en) | Vehicle driving track sharing method and device, equipment and storage medium | |
CN114266080A (en) | Data integrity protection method and system based on state cryptographic algorithm | |
CN113472749A (en) | Method for preventing unauthorized self-service machine terminal from accessing B/S architecture system | |
JP2016071644A (en) | License management method and license management system | |
CN113806778B (en) | Data management method, system and storage medium based on big data platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181109 |
|
WW01 | Invention patent application withdrawn after publication |