CN109151012A - A kind of push mode runs program technic and its application method, correlation technique - Google Patents
A kind of push mode runs program technic and its application method, correlation technique Download PDFInfo
- Publication number
- CN109151012A CN109151012A CN201810912452.5A CN201810912452A CN109151012A CN 109151012 A CN109151012 A CN 109151012A CN 201810912452 A CN201810912452 A CN 201810912452A CN 109151012 A CN109151012 A CN 109151012A
- Authority
- CN
- China
- Prior art keywords
- instance
- push
- program
- input
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Abstract
The present invention provides a kind of push mode and runs program technic, first instance using the input and output for the program being currently running through second instance be pushed to its connection second system or be pushed directly to portable computer as second instance, tablet computer, input and output are carried out on the input-output equipment of mobile terminal or wearable device, it is also possible to program or is pushed on the second system of its connection there are also operation on data-pushing to second instance or through second instance run and its input equipment at least to be used to carry out input or export using its output equipment or carry out input and output using its input and output device simultaneously.Push mode of the invention runs that program technic may be implemented to operate convenient, information privacy, function uses and program exempts from downloading and exempt from installation to exempt from operation actively operation etc..It the present invention also provides the application method of the above method, realizes the device of the above method, and has refined a kind of method of protection information security, a kind of sending signal specific recognition RFID approach.
Description
Technical field
The invention belongs to information technology fields more particularly to a kind of push mode to run program technic and its utilization side
Method further relates to a kind of device, a kind of method and a kind of sending for protecting information security for realizing that push mode runs program technic
Signal specific distinguishes RFID approach.
Background technique
There is one group of camera lens in April, 2018 inside the film " player behind the scenes " that China shows, the clock off year of Xu Zhengyan returns
On cell doorway, stretched head hand inputs password enablings on access control in vehicle when family, both inconvenience or dangerous.In reality,
Many units and cell are then the forms of card that uses, or hold and swipe the card (personnel enter and leave also in this way), or card is fixed
Onboard can in a certain distance automatic identification, to facilitate, especially latter, but this mode is only recognized card and do not recognized
People can equally be used to enter and leave if card or stolen with truck.Some units and cell are by the way of verifying biological characteristic
(such as fingerprint, iris, face), but the case where there is also can forge and (such as be forged with fingerprint hand film, photo), and it is right
In verifying living body or verify whether it is technically voluntarily to be difficult to solve the problems, such as (such as the apple hand of new generation of support brush face
Machine can brush the unlock of its face in owner during sleep).Currently, mobile application is surging forward, life is greatly facilitated in many fields,
But it actually uses or there are some problems.For example, the use of shared bicycle, from unlock mobile phone, opens corresponding APP entrance
Unlocking pin is obtained to barcode scanning interface and barcode scanning to unlock again, needs cumbersome operation and longer waiting time.Mobile payment
It is also such.The concepts such as intelligent appliance, smart home become more and more popular at present, and control is also a problem, according to general
Software control, there is the similar problem of front mobile payment, then need cumbersome operation and longer waiting time, if
General software control is not used, then a kind of household electrical appliances or a kind of scene just need an APP, further increase trouble.ATM in bank
It is having that installation camera takes on the sly, have additional equipment steal information there are many problems, or even there are also the ATM machine of personation, that is, calculate
There is no security risk, it is also pretty troublesome that people's multimachine will be lined up when few.Other public service facilities are also in this way, such as government's machine
Close the self-service equipment at administrative services center, financial service site, library etc..As the information technologies such as internet are permeated
Daily life is deeper and deeper and the technology and means of some information collections (such as brush face brush finger line swipe the card brush identity card) application is got over
Come more universal, the problem of information security is more and more prominent, without agreeing to or authorization acquisition, use, propagate personal information or even hidden
The case where personal letter ceases is impossible to guard against, in an unguarded moment or without notice, is stored in mobile phone, private information (such as account, close on computer
Code, telephone number, address list, photo) it is just easily just whole by certain websites (passing through its procedure site and cell phone application etc.)
It takes away, recording operation behavior and habit, then advertisement brings puzzlement, or even is directly or indirectly used for personal information illegal
In criminal activity, serious infringement right of privacy etc..
Summary of the invention
It is an object of the invention to solve aforesaid operations are inconvenient, information security there are hidden danger the problems such as, provide first one
Kind of push mode runs program technic, by input and output being pushed out through second instance or even program tape data also push
It goes out to run, exempts from operation actively fortune to realize convenient operation, information privacy, function use and program and exempt to download to exempt to install
Row etc..Its technical solution is as follows:
Scheme includes two class entities, and the first instance of first kind entity i.e. hereinafter is push side, and the second class entity is i.e. hereinafter
The and entity is to receive push side, can the program for pushing input and output and running do not push, program can also be pushed
After rerun and have to carry out input and output, both of which is the push application in the present invention, the feelings not specialized
Under condition, push application includes above-mentioned two situations;Correspondingly, technical solution also there are two types of.In the present invention, push has without asking
Seek the meaning with regard to active transmission.
The first scheme is that the program for only pushing input and output and running does not push, and this scheme can only utilize and be pushed end
(may be the second equipment, it is also possible to its second system being connected to) uses the related function of input-output equipment and resource,
And other software and hardware resources cannot then use: first instance the first system for itself being also possible to first instance to be connected to just
With short-distance wireless communication mode and/or the wired of analog signal transmission is not based in all or part of output of the program of operation
Communication mode, which is pushed on the output equipment of the second system of its connection through second instance, realizes output, short-distance wireless communication side
Formula can for based on Huawei Hlilink, Mesh, ZigBee, WirelessHART, MiWi, Thread, Z-Wave, LiFi,
The communication of WiFi, Bluetooth, IrDA, ZigBee, NFC, UWB, DECT or RFID technique are not based on simulation letter
Number transmission wired communication mode communication media can be twisted pair, coaxial cable, optical cable or data line, why be not institute
Wired communication mode be because digital signal adaptation range it is bigger, can be the various cable network forms of current main-stream,
Such as Ethernet, and analog signal is generally used to transmission video, audio, is easy distortion.First instance can be with communication
And/or wired communication mode is connected to the first system, here with no restrictions for communication mode, first instance can be first
A part of system has the function of push, is exported all or part of the first system by the function that the first system assigns
Push out, can also be only the relaying of a push, the first system is first pushed to first instance, and first instance is pushed out again
It goes;Second instance can also be connected to the second system with communication and/or wired communication mode, and second instance can be with
It is a part of second system, has the function of receiving push, receives the function of assigning after push by second system again second
It is exported on the output equipment of system, can also be only the relaying of a push, have the function of that receiving push first receives
The push of first instance, is then pushed to second system again.It can also completely or partially export with short-distance wireless communication mode
And/or be not based on analog signal transmission wired communication mode be pushed to the portable computer as second instance, tablet computer,
Output is realized on the output equipment of mobile terminal or wearable device, is to be pushed directly to second instance here, second instance is just
It is final purpose, here in order to avoid offsetting we with prior arts such as the network printer, the projectors that have been carried out now
The creativeness of case, therefore second instance is limited to portable computer, tablet computer, mobile terminal and wearable device, simultaneously
Also because the current ownership of these equipment is very big, but it is difficult to be shared use, so relevant function should be expanded.The above is
For output the case where, below then respectively be for input and simultaneously be directed to input and output the case where, before have been described above explanation
Similar situation, following two situation similarly adapts to, is not repeated to illustrate.It is the case where for input, all or part of
Input with short-distance wireless communication mode and/or can be not based on the wired communication mode of analog signal transmission and push away through second instance
It is sent on the input equipment of the second system of its connection and realizes input, it is logical with short-distance wireless to be also possible to all or part of input
Letter mode and/or the wired communication mode for being not based on analog signal transmission are pushed to the portable computer as second instance, put down
Input is realized on the input equipment of plate computer, mobile terminal or wearable device.Simultaneously be directed to input and output the case where, all or
Part input and output with short-distance wireless communication mode and/or are not based on the wired communication mode of analog signal transmission through the simultaneously
Two entities are pushed on the input-output equipment of the second system of its connection simultaneously and realize input and output, are also possible to whole or portion
Point input and output with short-distance wireless communication mode and/or are not based on the wired communication mode of analog signal transmission and are pushed to simultaneously
It is realized on input-output equipment as the portable computer of second instance, tablet computer, mobile terminal or wearable device defeated
Enter output.This programme will input, output pushes out, and allow to support the terminal for receiving push to push away to receive with any other
It send, the equipment so as to use oneself convenient to use realizes program in position (in the communication range of permission) convenient to use
Input, output, conducive to realize input, output information secrecy.The input and/or output that second instance receives push can be
(WINDOWS is similar to by the firmware program (such bare machine just can receive) that runs thereon, the service routine for belonging to operating system
System service in system) or be not belonging to the service routine of operating system (service processes of running background are generally required and manually opened
It is dynamic) it is automatic received, can also further actively it be sent on input equipment and/or output equipment after the receipt, i.e., defeated
Enter and carry out inputting and being exported on an output device in equipment, it is by specified communication that communication aspects, which can further to define,
Agreement (being as previously mentioned agreement, Ethernet protocol, ICP/IP protocol of short-distance wireless communication mode etc.) or there are also port into
Row is received, i.e., always by specified communication protocol or there are also ports to be ready to receive in monitoring, it is possible to specify one can also
As soon as support multi-protocols to need to specify multiple communication protocols more than (such as two, three or more) communication protocol with specified,
Also can specify one for the same image protocol also can specify more than one (such as two, three or more) port,
Multiport is supported just to need to specify multiple ports.
Second scheme be rerun and have to input using local input output equipment after pushing program it is defeated
Out, it with the development of the technologies such as cloud computing, shares and utilizes computing resource (such as CPU, GPU) storage resource (such as memory and other classes
Type storage) push products operation may be implemented, but can not achieve the interaction with local, this programme is then to share to utilize this
It is also interacted using local input output equipment while ground computing resource storage resource, facilitates operation, information to reach
The purpose of secrecy, rather than only resource-sharing;Compared to the first scheme, this programme is pushed out by program or there are also data itself
It goes, can use local more resources;Difference with WEB application is that web program (such as webpage) is just obtained after requesting
's;Difference with C/S application is that the client (i.e. C) of C/S application is mounted in advance, and server-side (i.e. S) can only push away
Send data to client, although certain data may result in the specific function of client executing.First instance handle is locally stored
And/or the first system storage its connection program or with short-distance wireless communication mode and/or be not based on there are also data
The wired communication mode of analog signal transmission is pushed to operation on second instance or is pushed to the second of its connection through second instance
Operation and the second instance or the second system run the program of above-mentioned push or the data using above-mentioned push in system
It at least to use its input equipment carry out input when running the program of above-mentioned push or carry out output or same using its output equipment
When using its input and output device carry out input and output.A kind of special situation is exactly in the second instance or described
Two system has locally had the program of above-mentioned push or there are also in the case where the copy of data, and the first instance does not push above-mentioned
Program or there are also data whole or further clarify only push for retrieve local replica segment and the second instance or
The second system directly transfers corresponding local replica operation according to the segment of above-mentioned push and at least to use its input to set
It is standby to receive input or carry out output using its output equipment or carry out input and output using its input and output device simultaneously.Push
Program can be pushed first there are also data for retrieving the segment of local replica and only in the second instance or described second
System just continues to push remaining program when can not retrieve local replica according to the segment of above-mentioned push or there are also data, in this way
Save on push cost, efficiency can be greatly improved, especially the program of push or there are also data it is bigger when.The
The program of the program or the program or operation push that are pushed using the data run pushed of two entities or second system operation push
Local replica or using push data local replica operation push program local replica, which is as operation
System operation is run by its operating system or is run by corresponding specialized application software thereon;Second instance
It receives the program of push or there are also data can be through the firmware program (such bare machine just can receive) that runs thereon, belongs to behaviour
Make the service routine (similar to the system service in WINDOWS system) of system or be not belonging to operating system service routine (after
The service processes of platform operation, generally require and manually start) it is automatic received, it after the receipt can also be further actively using it as behaviour
Make system operation run by its operating system or by call thereon corresponding specialized application software run, lead to
Letter aspect can further to define be by specified communication protocol (be as previously mentioned short-distance wireless communication mode agreement, with
Too fidonetFido, ICP/IP protocol etc.) or carry out received there are also port, i.e., exist by specified communication protocol or there are also port always
Monitoring is ready to receive, it is possible to specify and one also can specify more than one (such as two, three or more) communication protocol,
Support multi-protocols just need to specify multiple communication protocols, for the same image protocol also can specify one also can specify it is super
As soon as crossing (such as two, three or more) port, multiport is supported to need to specify multiple ports.
The technical solution that above-mentioned push mode runs program technic can be refined further and perfect:
It is that the communication link established after perceiving second instance between the two is pushed or gone back that first instance, which can be specified,
The certification of perception stage is carried out to second instance in perception and only at it by being both foundation in the case where certification
Between communication link carry out push or first instance is also needed to second instance and/or the during establishing communication link
Two entities also need the certification for carrying out the networking stage to first instance and only all by just establishing communication in the case where certification
Link, i.e. first perception resettle communication link (realizing connected network communication) and could push, and carry out in perception to second instance
The verifying of perception stage can be based on obtained in perception from second instance entity identification information, digital signature information,
Physical network mark/address information and/or the other information that can be used for verifying, for example whether it is verified by entity identification information
To authorize the object that can be pushed, the verifying for carrying out perception stage to second instance in perception is also possible to be based on perceiving
The encryption information that second instance described in Cheng Zhongcong obtains can be decrypted correctly, be able to carry out retrieval and/or be able to carry out comparison, no
It can be decrypted correctly, not can be carried out retrieval and what cannot be compared cannot pass through verifying;During establishing communication link
First instance also needs also to need the verifying for carrying out the networking stage to first instance can be second instance and/or second instance to be based on
Physical network mark/address information is verified, for example verifies whether it is authorization by physical network mark/address information
The object that can be pushed.It to the perception of second instance is perceived by active probe mode that first instance, which can be further clarified, main
Dynamic detection, which can be, carries out active spy based on radar, computer vision, other sensors, RFID technique or other network technologies
Survey, the step of network protocol generally all include detection especially wireless network protocol, above-mentioned agreement can be based on and be detected, can also
It, at this moment can be with direct detection to be to detect (such as video monitoring) based on other technologies, such as radar detection, computer vision
Second instance can also detect the other object or person for including or holding second instance;The type of active probe can be wirelessly
Electric signal detection is also possible to electric signal detection, such as based on the spy of wired network protocol such as based on the detection of wireless network protocol
It surveys;The strategy of active probe can be physical trigger detection (such as pressing entity key), signal triggering detection (such as receives second instance
Signal), period active probe, timing active probe and uninterrupted active probe;The function of active probe can be needs
It manually or automatically enables, can further clarify and manually or automatically enable to be by application entity button, application entity key, behaviour
Make physical switches, operation virtual push button, operation virtual key and/or operates what virtual switch was realized, correspondingly, active probe
Function, which can be, to need manually or automatically to close, can further clarify manually or automatically close be by application entity button,
What application entity key, application entity switch, operation virtual push button, operation virtual key and/or operation virtual switch were realized;The
It is to be contacted/non-connect that one entity, which can be and perceive second instance the or described first instance by autonomous active probe,
It just carries out active probe after touching excitation and perceives the second instance.First instance, which can also be, receives second instance/non-
The signal that the third entity of first instance and second instance actively issues, signal can also further clarify as specific format/content
Signal after perceive, the signal that second instance or third entity actively issue may include entity identification information, physical network
Mark/address information, digital signature information establish network linking relevant information, the other information that can be used for verifying, request push
Information, specified request push application message and/or other additional informations;The signal packet that second instance or third entity actively issue
The information contained completely or partially can be encryption or still can decrypting can also be and can not decrypt, and establish between the two
Communication link can be according to based on physical network mark/address information for being obtained in perception from the second instance and/
Or network linking relevant information is established to establish.First instance, which can be, not to carry out active probe but (is such as pressing being contacted
Lower entity key) or non-contact (such as by sensor sensing to) excitation after can just receive second instance or third entity actively
The signal of sending and perceive second instance and receiving or first instance be to carry out active probe and thus drawing
Sending out second instance described actively issues signal and is received by the first instance and perceive the second instance.First is real
Body and second instance can have been established in advance communication link between the two and be to receive second in first instance or the first system
If the third entity of entity/non-first instance and second instance actively issue it is directly being pushed after request push signal and
Two entities actively issue its receive request push signal and carry out push and be not based on same logical communications links (i.e. based on not
Same logical communications links, or even use and be different communication protocol), or and be in first instance or the first system end by people
It is directly pushed after work or automatic trigger.First instance, which receives signal, to be by the firmware program that runs thereon, belongs to behaviour
Make the service routine of system or be not belonging to operating system service routine it is automatic received or to further clarify be by specified
One/more than a communication protocol or there are one/be more than a port carry out it is received, referring to the interpretation of front, no
It repeats again.It wakes up first instance or also wakes up it simultaneously and carry out pushing/executing other functional requirement second instances or third entity
The signal actively issued includes specific content, or further clarifies and can not then not wake up the comprising the specific content
One entity also wakes up it simultaneously and carries out pushing/executing other functions;Wake up first instance or also wake up simultaneously its push/
It executes the signal that other functional requirement second instances or the third entity actively issue and uses specific format, or further
Clearly carry out pushing/executing other function without can not then wake up first instance using the specific format or also wake up it simultaneously
Energy;The signal of specific format its format that second instance or third entity actively issue can be disclosed format or underground
Format;Signal its format that second instance or third entity actively issue be first instance cannot distinguish and/it is required then
First instance is without push;The function that first instance receives the signal that second instance or the third entity actively issue can be with
It is manually or automatically enabled, or further clarifies and manually or automatically enable to be pressed by application entity button, application entity
Key, application entity switch, operation virtual push button, operation virtual key and/or operation virtual switch are realized;First instance receives the
What the function for the signal that two entities or third entity actively issue can be closed manually or automatically, or further clarify manually or
Be automatically closed virtually is pressed by application entity button, application entity key, application entity switch, operation virtual push button, operation
What key and/or operation virtual switch were realized.May be required in first instance after establishing communication link must also obtain from second
The license of entity/second system is just pushed;It can require whether first instance must also have second instance/second system
Have receive push permission carry out verify and by verifying just pushed, first instance to second instance/second system whether
It is verifying second instance/second system User ID/user name, number label with the mode that the permission for receiving push is verified
Name/digital certificate and/or password/password/authorization code further clarify all or part of need on its input equipment i.e.
When input, or further clarify input be by keyboard, mouse, touch screen, the key of non-keyboard key, switch, voice, camera shooting
And/or other sensor sensing inputs;Can require second instance/second system also to first instance/the first system whether
With to its push permission carry out verify and by verifying just pushed, second instance/second system also to first instance/
The first system whether have the mode verified of permission pushed to it be verifying first instance/the first system User ID/
User name, digital signature/digital certificate and/or password/password/authorization code further clarify all or part of need at it
Inputted immediately on input equipment, or further clarify input be by keyboard, mouse, touch screen, non-keyboard key key, open
What pass, voice, camera shooting and/or other sensor sensings inputted.Push application (including push input and output and two kinds of push products
Second instance or second system situation, similarly hereinafter) in operation can will occupy its input equipment or defeated at any time or on specific opportunity
The push application of equipment is closed or is hung up or switches to backstage from front end or from front end is switched to from the background, can clearly pass through out
Application entity button, application entity key, application entity switch, operation virtual push button, operation virtual key and/or operation are virtual
What switch was realized.It establishes first instance acquisition after communication link and can be from the license of second instance/second system and first carry out
Prompt and being obtained in the case where agreeing to push express license or acquisition tacit declaration is permitted in the case where no oppositions push
Can, can also further clarify the operation for agreeing to push is realized or leads to by application entity buttons/keys/switch
It crosses operation virtual push button/key/switch to realize, or further clarifying the operation for opposing push is to pass through application entity
It is that buttons/keys/switch are realized or passing through operation virtual push button/key/switch realizes.Operation is completed in push application
Second instance/second system, which can not retain the program being pushed or not retain the data being pushed or not retain any push, answers
It uses running trace or does not record push and the program being pushed is exported or only retained using all/part in operation as locally
Copy (next time also can be used, i.e., aforementioned, and local here is that second instance/second system is local) only retains quilt
The data of push are as local replica or retain whole/part in all received program and data or record push application operation
Input or record push export or record whole/partial analysis processing in push application operation using all/part in operation and tie
It is local using all/part in operation that fruit or record push the local operation log of whole/part or record push in application operation
Data access log.The program of push can be for shell script or to further clarify be autoexec/html file/XML text
Part/common text files is also possible to binary program or further clarifies be EXE file/command file/dll file/OCX text
Part.The program of push can be application program or be system program or be Virus or be trojan horse program.The program of push is complete
Portion or part can be encrypted, digital signature, by verifying and/or by Third Party Authentication.The number of push
According to it is all or part of can be abstract having encrypted, being digital signature, comprising all/part push program and/or
Abstract comprising all/part push data.The program of push or also data completely or partially can be by symmetrically adding
What close algorithm or rivest, shamir, adelman had encrypted;The program of push there are also data is calculated by homomorphic cryptography
Method or non-homomorphic encryption algorithm encrypt;The program of push or also data completely or partially can be by verifying, by dividing
It analysis and/or is verified using authentication module;The program of push or there are also data completely or partially can be according to third party
Certification mark, according to Third Party Authentication certificate and/or being judged whether using Third Party Authentication module through Third Party Authentication.?
It receives the program of push or there are also the journeys that the second instance of data or second system only run the above-mentioned push that can be decrypted correctly
Sequence, the program for only using the above-mentioned push of the data run that can be decrypted correctly, only operation can pass through the journey of the above-mentioned push of verifying
Sequence only uses and can run by the program of the above-mentioned push of data run of the above-mentioned push of verifying and/or only and passed through third party
The program of the above-mentioned push of certification.The program of push or the second instance of also data or the second system are received not
Run the program for the above-mentioned push that can not be decrypted correctly, without using the journey of the above-mentioned push of the data run that can not be decrypted correctly
Sequence, do not run cannot by the program of the above-mentioned push of verifying, without using can not be by the above-mentioned push of data run of verifying
Program and/or do not run the program of the above-mentioned push not over Third Party Authentication.First instance can be fixed equipment list
Body, semifixed equipment monomer, portable computer, tablet computer, mobile terminal, wearable device or other including having communication
With the electronic device of processing capacity or consolidating as the part thereof of fixation at least with communication capacity, half for computer installation
Fixed, removable or wearable monomer;Can further clarify first instance be gate input module containing permission partial monosomy, it is other out
Entrance access control system partial monosomy containing identity recognizing unit, other entrance access control system consoles, household electrical appliance, lamps and lanterns, trip
Gaming machine, navigator, smart home main control device, attendance recorder, cashing machine, POS machine, PIN PAD, ATM, withdrawal
All-in-one machine, automatic vending machine, automatic machine, Recharging Machine, automatic ticket checker, self-help inquiry apparatus, self-service printer, aviation
Self-service check-in equipment, Multi-functional Self-aided Service Terminal End, other self-service business handling machines, self-service ticketing machine, magnetic stripe card read-write/reading
Device, radio frequency read-write/reader, shared bicycle, shared electric vehicle, is shared and is charged in charger baby mode chip card read-write/reader
Precious managing device, the shared commodity in other shared economic models, the device that shared commodity are managed in other shared economic models,
Car body electronic control device for vehicle, vehicular automotive electronic control device, other device for vehicular electronic, the control of non-motor vehicle
It is device, other non-motor vehicle device for vehicular electronic, electronic controller for electromechanic apparatus, other electromechanical equipment electronic devices, big
Medium-sized electromechanical equipment console, Console Operated In Medium Or Large Scale Computer Systems, functional mobile phone, smart phone, tablet computer, PDA, notes
This computer, smartwatch, intelligent spire lamella, ammeter, water meter, gas meter, flow meter or other electronic equipments for needing to realize non-contact access/
Computer equipment.Second instance can be fixed equipment monomer, semifixed equipment monomer, portable computer, tablet computer, movement
Terminal, wearable device or it is other include with communication and processing capacity electronic device or computer installation be used as one
The partial fixation at least with communication capacity, semifixed, removable or wearable monomer;Second instance can be further to define
For functional mobile phone, smart phone, tablet computer, PDA, laptop, smartwatch or intelligent spire lamella.The first system is to fix
Equipment (not necessarily require for monomer, similarly hereinafter), portable computer, tablet computer, mobile terminal, wearable is set semifixed equipment
Standby, other electronic device/computer installations or above system with communication and processing capacity can will be used as part thereof of
By the part after the first instance separation when first instance is separated;The first system can be further to define to be gate, go out
Entrance access control system, household electrical appliance, intelligentized Furniture system, attendance checking system, marketing system, shared economic model background support system
It is system, electronic government affairs system, bank counter system, bank payment system, online payment system, automobile, other motor vehicles, non-maneuver
Vehicle, electromechanical equipment, self-help ticket-buying/fetching system, self-service ticketing system, SCM system or above system can will be used as it
By the part after the first instance separation when first instance of a part is separated.Second system is fixed equipment, partly consolidates
Locking equipment, portable computer, tablet computer, mobile terminal, wearable device, other Departments of Electronics with communication and processing capacity
By the second instance point when system/computer system or above system can will be separated as part thereof of second instance
Part from after;Can further to define second system be mobile intelligent terminal, it is wearable smart machine, tablet computer, portable
Computer or above system can be by will be after the second instance separation when separating as part thereof of second instance
Part.Third entity can be functional mobile phone, smart phone, tablet computer, PDA, laptop, smartwatch or intelligent wrist
Band.The input and output of the program being currently running while being pushed on the input-output equipment of second instance or same through second instance
When be pushed to its connection the second system input-output equipment on when, can require at least push an interactive interface into
Row visualization shows to facilitate interaction, can further clarify the interactive interface and show at the beginning can limit on an output device
Short period in complete show to interact without obviously waiting, the interactive interface can be in the screen as output equipment
It can show when locking without unlock, the touch screen lock that the interactive interface can at the same time as input equipment and output equipment
It can be inputted when determining without unlock, the interactive interface can open voluntarily so when the screen as output equipment is closed
Show afterwards and/or the interactive interface can be in the case where the screen front end as output equipment has other interfaces automatically preceding
End shows.Second instance or second system operation push program or using push data run push program and make simultaneously
When carrying out input and output with its input and output device, it can require at least to visualize on an output device and show an interaction
To facilitate interaction, can further to define that the interactive interface shows at the beginning on an output device can be in the shorter of restriction at interface
Complete in time to show to interact without obviously waiting, the interactive interface can be in the screen locking as output equipment
When without unlock can show, the interactive interface can at the same time as the touch screen of input equipment and output equipment lock when
Time can be inputted without unlock, the interactive interface can open voluntarily and then show when the screen as output equipment is closed
And/or the interactive interface can be in the case where the screen front end as output equipment has other interfaces automatically in front end exhibition
It is existing.The input and output of the program being currently running while being pushed on the input-output equipment of second instance or same through second instance
When be pushed to its connection second system input-output equipment on when, can require that visual interactive interface will not be showed also
Can further clarify is by that can lead to after corresponding output equipment playing alert tones, unlatching warning light and/or flash for prompting lamp
Cross corresponding input equipment input.The program or pushed using the data run of push that second instance or second system operation push
Program or operation push program local replica or using push data local replica operation push program sheet
Ground copy and when carrying out input and output using its input and output device simultaneously, can require will not to show visual interaction circle
It is by corresponding output equipment playing alert tones that face, which can also further clarify, is opened after warning light and/or flash for prompting lamp i.e.
It can be inputted by corresponding input equipment.The output for the program being currently running is pushed on the output equipment of second instance or is passed through
The visualization interface that second instance is showed when be pushed on the output equipment of the second system of its connection simultaneously can be with other need
The visualization interface to be showed is shared, which to can be used the same screen as output equipment also, can further clarify other need
The visualization interface to be showed is other push applications or operation local program, and is further clarified shared using same
Only one interface shows in front end or shows in front end but mutually do not block or do not have at least partially when one screen
It is blocked.The input for the program being currently running is pushed on the input equipment of second instance or through second instance while being pushed to
The same input equipment can be used with other procedure sharings when receiving input on the input equipment of its second system being connected to, may be used also
Further clarify it is shared using only one program when the same input equipment currently pass through the input equipment input or
Input is currently being carried out by the input equipment but is respectively receiving different input contents.The output for the program being currently running
It is pushed on the output equipment of second instance or through second instance while being pushed on the output equipment of second system of its connection
When can monopolize using relevant output equipment until terminate or be switched to backstage, hang up or close, can also further it is bright
It can really be operated by specific screen sliding, specific keys operate, special sound control operates, is real by video/image acquisition mode
Existing specific control operation or any combination thereof realize by front end run program or other push application switchings to from the background, hang-up or
It closes.The input for the program being currently running is pushed on the input equipment of second instance or through second instance while being pushed to it
It can be monopolized when receiving input on the input equipment of the second system of connection using relevant input equipment until terminating or being cut
Backstage is changed to, hangs up or closes, can also further clarify can be by the operation of specific screen sliding, specific keys operation, special sound
Control operation, the specific control operation realized by video/image acquisition mode or any combination thereof, which are realized, runs journey for front end
Sequence or other push application switchings to backstage, hang-up or are closed.The input and/or output for the program being currently running is pushed to
The input for being pushed to the second system of its connection on the input equipment and/or output equipment of two entities or through second instance is set
When on standby and/or output equipment, it can not stop or not hang up the second instance or the second system in the program of operation
Or further clarify and the program in front end operation is switched to backstage, hang up or close, can also further clarify can pass through
The specific control that specific screen sliding operation, specific keys operation, special sound control are operated, realized by video/image acquisition mode
Operation or any combination thereof realization is made front end is run program or other push application switchings to backstage, hang-up or is closed.Just
On the input equipment and/or output equipment that the input and/or output of the program of operation is pushed to second instance or through second in fact
Body can have the local program of operation or other push away when being pushed on the input equipment and/or output equipment of the second system of its connection
Send using can also further clarify at this time by front end operation program or other push application switchings to backstage, hang-up or pass
Close, and further clarify can by specific screen sliding operate, specific keys operation, special sound control operation, by video/
Specific control operation that Image Acquisition mode is realized or any combination thereof, which is realized, cuts front end operation program or other push application
Backstage is changed to, hangs up or closes.The program or pushed using the data run of push that second instance or second system operation push
Program or operation push program local replica or using push data local replica operation push program sheet
Can have the local program of operation or other push applications that can also further clarify when ground copy at this time will be in the journey of front end operation
Sequence or other push application switchings to backstage, hang up or close, and further clarify and can be operated by specific screen sliding, is specific
Button operation, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof
It realizes and front end is run into program or other push application switchings to backstage, hang-up or is closed.Second instance or the second system
It runs the program of push or uses local replica or the use of the program of the data run push of push or the program of operation push
The service being able to access that can be used and/or can call when the local replica of the program of the local replica operation push of the data of push
It is the function that dynamic link library, control, running environment provide that local program, which can also further clarify the local program that can be called,
And/or other functions that running environment provides.The local replica of the program of the push of second instance or the second system preservation or
It can be stored in the same memory space for specially marking off and or be stored in not there are also the local replica of the data of push
In the same program operation for specially marking off in the memory space come or further clarifying above-mentioned memory space and above-mentioned push
The memory space being able to access that is the same memory space or the memory headroom run with it is the same memory space.Second is real
The sheet of the program of the program or the program or operation push that use the data run of push to push of body or second system operation push
Ground copy or using push data local replica operation push program local replica be one specially mark off come
Memory headroom in operation or to further clarify the memory headroom and the memory headroom that uses of local program operation be well-separated
's.What the program that second instance or second system operation push or the program pushed using the data run pushed or operation were pushed
The local replica of program or using push data local replica operation push program local replica when be only capable of access deposit
It stores up in the number for specially marking off the data of the memory space come, the above-mentioned memory space for being stored in and specially marking off cannot being accessed
Data except, be only capable of access by the data of Special Empower and/or cannot access not by the data of Special Empower or
Person further can prompt and/or will record access day when accessing the above-mentioned data being able to access that and/or the data that cannot be accessed
Will.The push that second instance can receive first instance automatically can be just can be automatic after opening automatic received switch
Receiving push or further clarifying the automatic received switch can be turned off manually or must be turned off manually or can be automatic
Close or can only be automatically closed must open manually or can only automatically open or can open or automatically open manually or
It can be turned off manually or be automatically closed, above-mentioned automatic received switch can be physical switches virtual switch or both
There are physical switches to have virtual switch again.
Realize that above-mentioned push mode runs the device of program technic, including at least the driving means and work as first instance
For the reception driving means of second instance, or the also push source device as the first system comprising being connected to first instance
And/or the push destination apparatus as second system being connected to second instance, it also may include the conduct being connected to first instance
The push source device of the first system and the push destination apparatus as second system being connected to second instance, or even can also wrap
Containing the sender unit as third entity.Can further to define the driving means be fixed equipment, semifixed equipment,
Portable computer, mobile terminal or wearable device, and further clarify reception driving means and be portable computer, move eventually
End or wearable device, the details of specific implementation run the technical solution of program technic referring to above-mentioned push mode, repeat no more.
Above-mentioned push mode runs the application method of program technic, technical solution are as follows:
First is that running program technic using above-mentioned push mode, push is showed by the output equipment of second instance or second system
The output of application can further clarify output equipment of the above-mentioned output equipment comprising the first instance or the first system not
The function (original deficiency can be made up in this way) that has, it is user-friendly (by position flexibly, simplify operation conveniently to make
With) and/or conducive to realize output information secrecy (can with oneself equipment and can additional protection measure, can be supervised at nobody
The position of control is conducive to secrecy in this way).Second is that running program technic using above-mentioned push mode, pass through the second instance or institute
The input equipment for stating second system realizes the input of push application, and can further clarify above-mentioned input equipment includes described first real
It is function (original deficiency can be made up in this way) that the input equipment of body or the first system does not have, user-friendly
(by position flexibly, simplify operation be easy to use) and/or conducive to realizing that the secrecy of input information (can use oneself equipment
And can additional protection measure, can in the position of no worker monitor, in this way be conducive to secrecy).Third is that being run using above-mentioned push mode
Program technic is realized by the input-output equipment of the second instance or the second system in the first instance or institute
State the use of the program function run on the first system, can further to define above procedure function include the second instance or
Function (can make up original deficiency in this way) that the second system does not have includes the second instance or second system
System can not can save expense cost by running the function (can make up original deficiency in this way) of program realization, using
It (pass through overhead cost realize save) and/or uses the consumption that can be reduced to local resource and (is subtracted by shared resource realization
Few consumption).Fourth is that running program technic using above-mentioned push mode, pushed away by the second instance or second system operation
The local replica for the program that the program sent or the program for using the data run of push to push or operation push uses push
The local replica of the program of the local replica operation push of data realizes above procedure or exempting to download, exempting to install there are also data
And/or exempt from operation actively operation (these are all benefits convenient to use), can also further clarify above procedure includes described the
Function (can make up original deficiency in this way) that two entities or the second system do not have will not be received by verifying/certification
The information for the information of the local original preservation of collection/be originally inputted to be conducive to realize information privacy (this and be all to be conducive to protect below
Shield Information Security) and/or by verifying/certification only analyze processing through encryption the original preservation in local information/it is original
The information of input is to be conducive to realize information privacy.Fifth is that running program technic using above-mentioned push mode, push can be to described
The manipulation of the equipment of the first system or the first instance, the transmission of data access, data mart modeling, data and/or other functions use
Application, thus by the second instance or the second system realization the first system or the first instance are set
Standby manipulation, data access, data mart modeling, data transmission and/or other functions use, and may be implemented to facilitate operation in this way.Using
Above-mentioned push mode runs program technic, push can authentication to the first system or the first instance, authorization and/
Or the application of authentication, to realize the first system or the first instance by the second system or the second instance
Authentication, authorization and/or authentication to it in this way first is that facilitating operation to realize, but are conducive to Information Security.Six
It is to run program technic using the above-mentioned push mode of right, pushes the second system or the second instance is first system
System or the first instance provide the application that its data access, data mart modeling, data transmission and/or other functions use, thus
Realize that the second system or the second instance provide its data access, data for the first system or the first instance
Processing, data transmission and/or other functions use, and may be implemented to facilitate operation in this way.Seventh is that being run using above-mentioned push mode
Program technic pushes instant between the first system or the first instance and the second system or the second instance
The application of communication interaction and/or operation collaboration, realizes the first system or the first instance and the second system or institute
The instant messaging interaction and/or operation collaboration between second instance are stated, may be implemented to facilitate operation in this way.Above-mentioned technical proposal can
In any combination.
Above-mentioned push mode run program technic application method can in practical application further refinement and it is perfect, it is several
Kind typical technical solution (and above-mentioned push mode run program technic embodiment) is:
Embodiment 1: by above-mentioned push mode run program technic be applied to shared bicycle, shared automobile, shared electric bicycle,
In shared clothes, shared charger baby, shared basketball, shared umbrella or the application of shared massage armchair business model, first instance is upper
State shared bicycle, shared automobile or shared electric bicycle or shared clothes, shared charger baby, shared basketball, shared umbrella
Or the managing device of shared massage armchair, second instance are smart phone, tablet computer or smartwatch, press the reality of first instance
Body button excitation first instance active probe simultaneously perceives the second instance or is put into second instance real close to described first
So that first instance is perceived second instance within the scope of the effectively perceive of body, then establishes communication linkage between the two and then first
Entity requests the application using sharing articles or further clarifies to be the phase that will be run on first instance to second instance push
The input and output of program are answered to be pushed on the input-output equipment of second instance or arrive corresponding program/program and data-pushing
It is run on second instance, user can be used corresponding by the interactive interface application that the input-output equipment of second instance shows
As the sharing articles of first instance or the sharing articles of first instance management, and is submitting application default while having submitted user
Being verified agreement in user information after information, it can be used or also require its corresponding password/password/authorization code/life of input
Object feature and agree to after being verified its can be used or and submit application but while after submitting user information do not want also
It asks it to input corresponding user information and/or password/password/authorization code/biological characteristic and agrees to that it can make after being verified
With or automatic/licensed corresponding user information that reads the user information locally saved or need to also locally be saved in reading
And/or password/password/digital certificate/authorization code/biological characteristic and agree to after being verified its can be used or it is automatic/
It is licensed to read the user information locally saved or also read local corresponding hardware attributes information/software setting information simultaneously
Agree to that it can be used after being verified, corresponding sharing articles can be used directly in user or it can make in agreement according to it
The relevant information that used time provides goes to obtain the use of corresponding sharing articles or further the relevant information is unlocking pin/authorization
Code.Using the technical program, using following (it is assumed that relevant equipment is all to realize push mode to run the step of shared bicycle
The device of program technic, it is driving means that it is lock that shared bicycle-, which further clarifies, and mobile phone is to receive driving means, communication protocol
Using the relevant agreement of NFC technique): certain shared bicycle is used, mobile phone (is passed through toward close put that lock for sharing bicycle
The range that NFC can be perceived), its push function is activated, unlock application is pushed on mobile phone by shared bicycle, locking and closing screen
The screen of the mobile phone of curtain is turned on and directly runs the unlock of the push in the case where no unlock and applies and enter unlock
Then interface, the user information (such as phone number) that local (mobile phone) is read in unlock application require input fingerprint to carry out using awarding
Power, after inputting fingerprint authentication success by mobile phone, sharing bicycle auto-unlocking be can be used, can also be as present shared bicycle
Using equally show unlocking cipher then with the password lock in person even if.The technical program realize first operation it is convenient, without screen
Curtain unlock, starting are applied, into the application existing operating process so cumbersome using interface, and unlock interface is directly entered;Secondly
It is applied without installing, and the shared bicycle of different company has different applications, to use the shared bicycle of which company just now
Corresponding application must be installed;Third is that the exclusive verification mode of mobile phone can be used, and fingerprint authentication, which is put on shared bicycle, is
It is unpractical, and mobile phone can be solved easily, more securely and reliably.If being want in this process using having run on mobile phone
Real-time interaction software (assuming that screen has unlocked) can then be operated by left and right screen sliding and be switched over.
Embodiment 2: above-mentioned push mode is run into program technic applied in mobile payment application, first instance is above-mentioned
Bank settlement device or its front end portion with communication function in mobile payment application, second instance are smart phone, plate electricity
Brain or smartwatch press the entity button excitation first instance active probe of first instance and perceive second instance or by the
Two entities are put into makes first instance perceive second instance within the scope of the effectively perceive of first instance, then establishes the two
Between communication linkage then application from first instance to second instance push mobile payment or to further clarify be real by first
The input and output of the corresponding program run on body are pushed on the input-output equipment of second instance or by corresponding program/programs
And run on data-pushing to second instance, user can by the interactive interface that the input-output equipment of second instance shows into
Row gathering and/or payment, or further clarify and directly inputting collecting account information or further clarifying collecting account letter
Breath is that bank account Receiving information/online payment platform account Receiving information can be completed gathering or directly input payment
It account information and/or has submitted corresponding password/password/authorization code/biological characteristic payment authorization information and is being verified
Payment can be completed afterwards or read after the collecting account information that locally saves automatic/licensed or need to also read local phase
Hardware attributes information/software setting information for answering and after being verified after gathering can be completed or in automatic/licensed reading
Take the payment account information locally saved or also need to read corresponding password/password/digital certificate/authorization code for locally saving/
The payment authorizations such as biological characteristic information and after being verified after payment can be completed or in the local guarantor of automatic/licensed readings
The payment account information deposited also is needed to read and demonstrate corresponding hardware attributes information/software setting information and is being verified
Payment can be completed afterwards or call payment function in local network after interactive interface operation and had input in its payment interface
It payment account information and/or has submitted the payment authorizations information such as corresponding password/password/authorization code/biological characteristic and is verifying
By rear or without inputting any information payment can be completed.Using the technical program, the step of carrying out mobile payment, is following (false
Fixed relevant equipment is all the device for realizing push mode and running program technic, and it is its front end that cashing machine-, which further clarifies,
Point it is driving means, mobile phone is to receive driving means, and communication protocol uses the relevant agreement of Bluetooth technology): by mobile phone toward the receipts
(range that can be perceived by bluetooth) is nearby put in the front end portion of money machine, activates its push function, and cashing machine will be paid
Using being pushed on mobile phone, the screen of the mobile phone of locking and closing screen is turned on and directly runs in the case where no unlock
Payment interface is applied and is entered in the payment of the push, payment is completed after inputting bank's card number and payment cipher, to use
Payment platform is paid, then selects certain payment platform in payment interface, then calls the local mounted payment platform
Application program simultaneously enters payment authorization interface, after inputting fingerprint authorization by mobile phone, that is, completes payment.
Embodiment 3: running program technic for above-mentioned push mode and be applied in electronic safety lock or access control system switch, the
One entity is the front end portion of above-mentioned electronic safety lock, access control system or the controllable lockmaking of access control system, and second instance is mobile phone, puts down
Plate computer or smartwatch, press first instance entity button excitation first instance active probe and perceive second instance or
Second instance is put within the scope of the effectively perceive of first instance or second instance passes through the operation sending of software/hardware thereon
Specific format/content signal makes first instance perceive second instance, then establishes communication linkage between the two then the
It is the corresponding program that will be run on first instance that one entity pushes the application of lock control or further clarify to second instance
Input and output are pushed on the input-output equipment of second instance or by corresponding program/program and data-pushings to second instance
Upper operation, the control that user can be locked by the interactive interface that the input-output equipment of second instance shows, and inputting
Corresponding password/password/authorization code/biological characteristic and after being verified or also it is required to provide corresponding user information i.e.
The control to lock can be achieved.Using the technical program, the step of carrying out non-contact unlocking, is following (it is assumed that relevant equipment is all real
The device that push mode runs program technic is showed, it is driving means, mobile phone that it is its control section that access control system-, which further clarifies,
It is to receive driving means, communication protocol uses the relevant agreement of WiFi technology): by mobile phone toward near the control section of the cashing machine
It puts (range that can be perceived by WIFI) or clicks the specific button of control section, activate its push function, gate inhibition
System will unlock using being pushed on mobile phone, and the screen of the mobile phone of locking and closing screen is turned on and the case where not unlocking
Unlocking interface is applied and is entered in the unlocking for directly running the push down, after inputting fingerprint authorization by mobile phone, that is, completes to unlock.
It is also possible to access control system unlocking interface is pushed on mobile phone, after inputting correct password by mobile phone, that is, completes to unlock.
Embodiment 4: above-mentioned push mode is run into program technic applied to TV, set-top box, sound equipment, refrigerator, air-conditioning, matchmaker
The mechanical, electrical rice cooker of body player, heating control, electric oven, electric fan, sweeping robot, camera, electrically driven curtain, air cleaning
In the remote control application of device or other household electrical appliance, first instance is above-mentioned TV, set-top box, sound equipment, refrigerator, air-conditioning, media are broadcast
Put the mechanical, electrical rice cooker of machine, heating control, electric oven, electric fan, sweeping robot, camera, electrically driven curtain, air purifier or
Other household electrical appliance, second instance are mobile phone, tablet computer or smartwatch, press the entity button excitation first of first instance
Entity active probe simultaneously perceives second instance or is put into second instance within the scope of the effectively perceive close to first instance or the
Two entities, which operate sending specific format/content signal by software/hardware thereon, makes first instance perceive second instance, so
Establishing communication linkage between the two afterwards, then first instance is to second instance push household appliance remote control application or further
Clearly be the corresponding program that will be run on first instance input and output be pushed on the input-output equipment of second instance or
It will be run on corresponding program/program and data-pushing to second instance, user can pass through the input-output equipment of second instance
The interactive interface showed realizes the remote control to household electrical appliance, or further clarifies and need to input user information before being remotely controlled
Or it is also required to input corresponding password/password/authorization code/biological characteristic and after being verified or automatic/licensed
The corresponding user information and/or password/password/number that reads the user information locally saved or need to also locally be saved in reading
Certificate/authorization code/biological characteristic and after being verified or in automatic/licensed user information that locally saves or also of reading
Local corresponding hardware attributes information/software setting information need to read and can be just remotely controlled after being verified.Using this
Technical solution, the step of carrying out non-contact unlocking, are following (it is assumed that relevant equipment is all to realize push mode to run program side
The device of method, household electrical appliances are driving means, and mobile phone is to receive driving means, and communication protocol uses the relevant agreement of WiFi technology): it will
Mobile phone nearby puts (range that can be perceived by WIFI) toward the television set to be controlled, and activates its push function while also swashing
Remote control interface is all pushed on mobile phone by the push function of other household electrical appliances, these household electrical appliances near having lived, and respective interface has distinguishable
The a part recognized is not blocked, and the remote control interface of television set is selected to carry out operation control.
Embodiment 5: by above-mentioned push mode run program technic applied to ATM machine, the number of taking machine, ticket taking machine, booking machine, fill
Check-in or other self-service business handling machines non-contact in use, first instance be above-mentioned ATM machine, self-help inquiry apparatus, the number of taking machine,
Ticket taking machine, booking machine, top-up machines or other self-service business handling machines, second instance are mobile phone, tablet computer or smartwatch, are pressed
The entity button excitation first instance active probe of lower first instance simultaneously perceives second instance or is put into second instance close
Within the scope of the effectively perceive of first instance or second instance passes through the operation sending specific format/content letter of software/hardware thereon
Number first instance is made to perceive second instance, then first instance pushes away the communication linkage for then establishing between the two to second instance
Sending the Touchless manipulation of self-service business handling machine to apply or further clarify is the corresponding program that will be run on first instance
Input and output are pushed on the input-output equipment of second instance or by corresponding program/program and data-pushings to second instance
Upper operation, user can be realized by the interactive interface that the input-output equipment of second instance shows to above-mentioned self-service business handling
The Touchless manipulation of machine, or further clarify and need to input user information before being remotely controlled or also require its input corresponding
Password/password/authorization code/biological characteristic and the user's letter locally saved after being verified or in automatic/licensed reading
Breath need to also read the corresponding user information locally saved and/or password/password/digital certificate/authorization code/biological characteristic
And after being verified or it is automatic/licensed read the user information that locally saves or need to also read it is local corresponding hard
Part attribute information/software setting information simultaneously just can be carried out Touchless manipulation after being verified.Using the technical program, carry out non-
The step of contacting self-service query is following (it is assumed that relevant equipment is all the device for realizing push mode and running program technic, to scheme
The self-service query retrieval machine in book shop is driving means, and mobile phone is to receive driving means, and communication protocol is relevant using WiFi technology
Agreement): mobile phone is nearby put into once (range that can be perceived by WIFI) toward self-service query retrieval machine, it is activated to push function
Can, the self-service query retrieve machine query and search interface is pushed on mobile phone (different mobile phones correspond to different query and searches into
Journey carries out different inquiries), locking and close screen mobile phone screen be turned on and in the case where no unlock directly
Query and search interface is applied and entered to the query and search for running the push, inputs keyword by mobile phone, can be inquired
It retrieves and shows result in mobile phone.
Embodiment 6: above-mentioned push mode is run into program technic and is applied to closely using in the application of function, first is real
Body is that entity is desktop computer, portable computer, mobile phone, tablet computer or smartwatch, and second instance is mobile phone, plate
Computer or smartwatch press the entity button excitation first instance active probe of first instance and perceive second instance or incite somebody to action
Second instance is put within the scope of the effectively perceive of first instance or second instance is special by the operation sending of software/hardware thereon
The formula of fixing/content signal makes first instance perceive second in fact with specific data line connection first instance and second instance
Body, then establish communication linkage between the two then first instance to second instance push closely using the application of function or
It is that the input and output of the corresponding program that will be run on first instance are pushed to the input and output of second instance and set that person, which further clarifies,
Standby upper or will run on corresponding program/program and data-pushing to second instance, user can pass through the input of second instance
The interactive interface that output equipment shows is realized to use to the short distance of first instance function or further clarify above-mentioned function
The function and/or be the function that its peripheral hardware has that first instance host itself has, or further clarify and carrying out closely
It needs to input user information before use or it is also required to input corresponding password/password/authorization code/biological characteristic and lead in verifying
Later believe or in automatic/licensed corresponding user that reads the user information locally saved or need to also locally be saved in reading
Breath and/or password/password/digital certificate/authorization code/biological characteristic and after being verified or in automatic/licensed reading
The user information that locally saves need to also read local corresponding hardware attributes information/software setting information and be verified
It just can be carried out and closely use afterwards.Using the technical program, carry out the step of near radio uses printing function it is following (it is assumed that
Relevant equipment is all the device for realizing push mode and running program technic, and the desktop computer for being connected with printer is driving means,
Tablet computer is to receive driving means, and communication protocol uses the relevant agreement of WiFi technology): by tablet computer toward wanting desktop computer attached
(range that can be perceived by WIFI) closely is put, activates it to export push function, by the shared application using printing function
It is pushed on tablet computer, tablet computer runs the application of the push and enters the shared interface using printing function, passes through
On input selection tablet computer after the document to be printed, document can be transmitted in the past and complete to print.
Embodiment 7: above-mentioned push mode is run into program technic and is applied in the closely application of reading, first instance is
Entity be the ammeter of electronization, water meter, gas meter, flow meter, other inconvenient meter readings gauge table or other sensor reading devices, second
Entity is mobile phone, tablet computer or smartwatch, presses the entity button excitation first instance active probe of first instance and feels
Know second instance or by second instance be put within the scope of the effectively perceive close to first instance or second instance pass through it is soft thereon
Part/hardware operation, which issues specific format/content signal, makes first instance perceive second instance, then establishes between the two
It is by first instance that communication linkage and then first instance push the closely application of reading or further clarify to second instance
The input and output of the corresponding program of upper operation be pushed on the input-output equipment of second instance or by corresponding program/program and
It is run on data-pushing to second instance, user can be realized by the interactive interface that the input-output equipment of second instance shows
To the short distance reading of first instance, or further clarifies and need to input user information before carrying out short distance use or also want
It is asked to input corresponding password/password/authorization code/biological characteristic and after being verified or in automatic/licensed reading sheet
User information that ground saves or need to also read the corresponding user information that locally saves and/or password/password/digital certificate/
Authorization code/biological characteristic simultaneously reads the user information that locally saves or need to also be after being verified or automatic/licensed
It reads local corresponding hardware attributes information/software setting information and just can be carried out after being verified and closely read.Using
The technical program, the step of carrying out non-contact meter reading, are following (it is assumed that relevant equipment is all to realize push mode to run program
The device of method, water meter indoors are driving means, and mobile phone is to receive driving means, and communication protocol is related using WiFi technology
Agreement): mobile phone is put into once (range that can be perceived by WIFI) toward the outdoor near the water meter for wanting meter reading, activates its defeated
Push function out will count interface and be pushed on mobile phone, meter reading can be completed.
It can be refined in from the above and locate a kind of method for protecting information security, technical solution is:
Scheme can also run the application side of program technic first is that running program technic from above-mentioned push mode from above-mentioned push mode
All or part of input in method is the input equipment by second instance or second system rather than first instance or the first system
The input equipment of itself carries out input to which all or part of input for being conducive to realize that the secrecy of input information extracts is to pass through
From it is being separated with itself or it is another inputted in additional input terminal itself, it is previously mentioned can use position flexibly and take attached
The safeguard procedures added to protect information security, can also further expand require the input terminal be it is believable, in general oneself
Equipment mobile phone be exactly it is believable, more conducively protection input message safety.Scheme is second is that run program technic from above-mentioned push mode
It can also be by passing through second instance from all or part of output in the application method that above-mentioned push mode runs program technic
Or second system input equipment rather than the output equipment of first instance or the first system itself carry out output to be conducive to realize
All or part of output that the secrecy of output information extracts be from it is being separated with itself or it is another additional output end itself into
Row output, it is previously mentioned to can use position flexibly and take additional safeguard procedures to protect information security, it can also be further
Expand the output end be it is believable, in general the equipment mobile phone of oneself is exactly believable, more conducively protection output information safety.
Scheme third is that run program technic from above-mentioned push mode can also be from the application method that above-mentioned push mode runs program technic
The program of push to be by the program of verifying extracted be passes through verifying and combine that expands can confirm this by verifying
Program can protect information security, and can confirm that the program can protect information security by verifying is to protect information security one very
Good measure cannot can consider that at least there are security risks, cannot run by this verifying;It can also be further
Can clearly confirm authorized will not access the information locally saved, licensed will not pass the local guarantor that can be decrypted correctly back
The information deposited, the information that licensed will not pass the local input that can be decrypted correctly back, will not licensed preservation can be just
The information for the local input really decrypted only passes the information locally saved that cannot be decrypted correctly back, only passes back and cannot be decrypted correctly
Local input information, only save the information locally saved that cannot be decrypted correctly and/or only save and cannot be decrypted correctly
The information of local input, above-mentioned measure protect the safety of information from different perspectives.Scheme from above-mentioned push mode fourth is that run
Program technic from the program of the push in the application method that above-mentioned push mode runs program technic is recognized by third party
The program of card extracted is to pass through Third Party Authentication and combine can confirming by Third Party Authentication for expansion that can protect letter
Breath safety, can confirm that the program can protect information security by Third Party Authentication is that protection information security one is arranged well
It applies, cannot can consider that at least there are security risks, cannot run by this Third Party Authentication;It can also be further
Can clearly confirm authorized will not access the information locally saved, licensed will not pass the local guarantor that can be decrypted correctly back
The information deposited, the information that licensed will not pass the local input that can be decrypted correctly back, will not licensed preservation can be just
The information for the local input really decrypted only passes the information locally saved that cannot be decrypted correctly back, only passes back and cannot be decrypted correctly
Local input information, only save the information locally saved that cannot be decrypted correctly and/or only save and cannot be decrypted correctly
The information of local input, above-mentioned measure protect the safety of information from different perspectives.Above scheme can be in any combination.
The method of above-mentioned protection information security can be refined further and perfect, and technical solution is arranged using following technology
It one of applies or any combination:
1, the information locally saved that cannot be decrypted correctly passed back or saved is still may be used using homomorphic encryption algorithm encryption
It, the advantages of this is homomorphic encryption algorithm, can be in the case of non-decrypting to be analyzed and processed in the case of non-decrypting
It is analyzed and processed, similarly hereinafter;2, the information for the local input that cannot be decrypted correctly passed back or saved is calculated using homomorphic cryptography
Method encryption still can be analyzed and processed in the case of non-decrypting;3, by user authentication when carrying out user authentication
Relevant information is pushed to or is pushed to after encrypting input terminal to carry out user authentication in input terminal, and user authentication is all on backstage at present
It carries out, input user authentication relevant information in front end all passes backstage back and carries out user authentication, and this technology measure is then gone around
The relevant information of user authentication for being stored in backstage is pushed to front end and carries out user authentication by it, and this technology measure can be used as one
A independent claim proposes that the method and measure that may also be combined with other protection information securities of the invention carry out into one it
It walks perfect, can arbitrarily select one, can also be the methods of the other protection information securities of selection and any combination of measure.It can also be into
The clear user authentication relevant information of one step is the letter that the user authentication in addition to the other equivalent informations of user name/user name needs
Breath, digital signature, digital certificate, password, password or authorization code, because back-end data is pushed to front end and generally requires as far as possible
It is few, it otherwise will cause the dangerous of the data of these push again, therefore, some numbers can only be selectively chosen from back-end data
According to according to the other equivalent informations of user name/user name for exactly inputting and extracting, (can be hardware attributes, IP address etc. can
To substitute the information of user name), the information of the above-mentioned user authentication needs in addition to the other equivalent informations of user name/user name,
Digital signature, digital certificate, password, password or authorization code can be according to the other equivalent information retrievals of the user name/user name
Input terminal is pushed to after out again;4, by the information and/or local with local input when carrying out information analysis processing
The information that the information of preservation is analyzed and processed together is pushed to or is pushed to after encrypting input terminal to be analyzed in input terminal
Processing, this is the 3rd expansion, is extended to front-end information analysis processing from front end user certification, can also serve as one solely
Vertical claim proposes that the method and measure that may also be combined with other protection information securities of the invention carry out it further complete
It is kind, one can be arbitrarily selected, can also be the method for the other protection information securities of selection and any combination of measure;5, it is being used
Family will be pushed to or one when certification together with the information of user authentication relevant information and local input related with user authentication
Third party is pushed to after same encryption to carry out user authentication or further clarify user authentication relevant information to be to remove in third party
Information, the digital signature, digital certificate, password, password that user authentication except the other equivalent informations of user name/user name needs
Or information, the number that authorization code or the above-mentioned user authentication in addition to the other equivalent informations of user name/user name need are signed
Name, digital certificate, password, password or authorization code are pushed away again after being retrieved according to the other equivalent informations of user name/user name
It is sent to input terminal;This is the 3rd mutation, becomes carrying out user authentication to third party from front end user certification;It equally can be with
Itd is proposed as an independent claim, may also be combined with other protection information securities of the invention method and measure to its into
Row is further perfect, can arbitrarily select one, can also be the method for the other protection information securities of selection and any combination of measure;
6, it is saved when carrying out information analysis processing by the information for needing the information for analyzing processing and local input and/or locally
Information is pushed to or is pushed to after encrypting together third party together to be analyzed and processed in third party;This is the 4th mutation,
Become to third party carrying out the analysis processing of information from front-end information analysis processing;It can also serve as an independent right to want
It is proposed is asked, the method and measure that may also be combined with other protection information securities of the invention carry out further perfect, Ke Yiren to it
Meaning selects one, can also be the method for the other protection information securities of selection and any combination of measure;7, above-mentioned to be decrypted correctly
Local input information be only applicable to personal information and/or individual privacy information or further clarify above- mentioned information be structure
Change information and/or unstructured information, personal information, individual privacy information needs are laid special stress on protecting, similarly hereinafter;8, above-mentioned cannot
The information locally saved being decrypted correctly is only applicable to personal information and/or individual privacy information or further clarifies above-mentioned letter
Breath is structured message and/or unstructured information.
The application method of the method for above-mentioned protection information security, technical solution (also can be used as embodiment) have following several
Kind:
Embodiment 1: by the approach application of above-mentioned protection information security to B/S mode or the software systems of C/S model, with
The software section of family end operation is allowed for authorized not accessing by verifying or Third Party Authentication confirmation and locally be saved
Information licensed will not pass the information locally saved that can be decrypted correctly back, licensed will not pass back and can correctly solve
The information of close local input, will not the local input that can be decrypted correctly of licensed preservation information, only pass back cannot be just
The information locally saved really decrypted, the information for only passing the local input that cannot be decrypted correctly back are only saved and cannot be decrypted correctly
The information locally saved and/or only save the information of local input that cannot be decrypted correctly.Using the technical program, letter is carried out
Ceasing safeguard protection, the specific method is as follows, and the internet hunt of search engine companies degree applies collection user information under a cloud,
Therefore certain degree, which needs its internet hunt to need to access web page program using user, transfers to Third Party Authentication confirmation not collect
User information can just leave no doubt as to really without collecting user information.
Embodiment 2: by the approach application of above-mentioned protection information security to B/S mode or the software systems of C/S model,
User authentication is to complete or further clarify the user name or other equivalences for being backstage according to user terminal input in user terminal
Information from retrieved in background user authentication information be pushed to after relevant authentication information is pushed to or encrypts user terminal again with
Completion compared with other information related with user authentication of family end input carry out analysis.Using the technical program, information is carried out
The specific method is as follows for safeguard protection, the software systems of certain C/S model, and client-side program inputs username and password in user
Afterwards, serve end program retrieves corresponding password according to the user name, and the password for being pushed to client and user's input compares
It is right, it is consistent, pass through certification.
Embodiment 3: by the approach application of above-mentioned protection information security to B/S mode or the software systems of C/S model,
User authentication is to complete or further clarify the user name or other equivalences for being backstage according to user terminal input in third party
Information retrieved from background user authentication information relevant authentication information and user terminal input it is other related with user authentication
Information be pushed to or be pushed to after encrypting together together third party carry out again analysis compare completion.Using the technical program,
Carrying out information safety protection, the specific method is as follows, and the software systems of certain C/S model, client-side program inputs user in user
After name and password, serve end program is pushed to together according to the password that the user name retrieves corresponding password and user's input
Third party is compared, and third party's comparison is consistent, passes through certification.
Embodiment 4: by the approach application of above-mentioned protection information security to B/S mode or the software systems of C/S model,
Information collection is to complete in user terminal and wherein collected personal information and/or individual privacy information are encrypting storings the
Tripartite, need using when file a request to the third party corresponding processing be decrypted by third party and executed to corresponding information
Or the non-decrypting processing directly executed, or further clarifying is that will be supplied to judicial apparatus after the video image information specified decryption
Pass will press the specified E-mail address information transmission mail wherein saved in plain text, will wherein be specified with what homomorphic encryption algorithm encrypted
Information directly carries out calculation process simultaneously feedback result or the telephone number information solution that will wherein specify in the case of non-decrypting
Short message is sent after close.Using the technical program, carrying out information safety protection, the specific method is as follows, the software system of certain C/S model
System, the personal information such as name, ID card No., cell-phone number, the home address of client-side program acquisition are stored to third party
It will be in someone ID and short message when serve end program will use someone cell-phone number transmission short message without being stored in server-side
Appearance issues third party, and third party retrieves according to the ID and short message content is sent to its cell-phone number after the cell-phone number of the people, if
Third party is believable, then information security is exactly secure.
It can also be run from above-mentioned push mode and extract a kind of signal specific recognition in the specific condition of program technic
RFID approach, technical solution are:
Above-mentioned push mode is run into wake-up first instance in program technic or also wake up simultaneously its push/execute it is other
The signal that functional requirement second instance or third entity actively issue includes specific content and/or uses in specific format
First instance is clearly that signal is received based on RFID technique, is thus extracted by the inclusion of specific content and/or use
The signal of specific format realizes recognition to RFID to wake up RFID, can also further clarify not comprising specific content
And/or using the specific format, then the signal can not wake up recognition of the RFID realization to the RFID, and also require special
Fixed content should be different in the foremost portion of whole signals and/or the frequency range of the frequency range and RFID feedback that issue signal.
Above scheme can also be refined further, which includes that can be directly used for determining the data of time, can be directly used for determining position
Data and/or can be directly used for execute instruction or further clarify the RFID be by association clock can be direct to obtain
Determine the data of time, the RFID be by coordinate interrelation module with obtain can be directly used for determine position data and/
Or the RFID is by associated instructions generator or command memory to obtain the instruction that can be directly used for executing.Current
RFID tag, as long as corresponding reader can read the content of RFID tag, by this method, corresponding reader is also
Signal specific can be issued by, which needing, could read the content of RFID tag, otherwise can not wake up RFID and feed back its content, thus may be used
To realize that the content of RFID tag cannot be distinguished arbitrarily, to protect its information security.
Above-mentioned signal specific recognition RFID approach can extract a kind of RFID comprising specific data, technical solution
It is:
RFID includes that can be directly used for determining the data of time, can be directly used for determining the data of position and/or can be directly used for
The instruction of execution;It is by association clock to obtain the data that can directly determine the time that RFID, which can also be further clarified, and
Further clarify RFID be by coordinate interrelation module with obtain can be directly used for determine position data, and further it is bright
True RFID is by associated instructions generator or command memory to obtain the instruction that can be directly used for executing.
The application method of the above-mentioned RFID comprising specific data, technical solution is:
The RFID of data in the above-mentioned RFID comprising specific data comprising can be directly used for determining the time is used as time tag,
The time tag being used as can also be further clarified;Or it will be true comprising can be directly used in the above-mentioned RFID comprising specific data
The RFID for positioning the data set is used as location tags, can also further clarify the location tags being used as;Or include by above-mentioned
RFID comprising the instruction that can be directly used for executing in the RFID of specific data is used as instruction label, and can also further clarify is to use
The instruction label of work.
Claims (10)
1. a kind of push mode runs program technic, it is characterised in that:
The all or part of output for the program that first instance is currently running the first system of itself and/or its connection is with short distance
Communication and/or the wired communication mode for being not based on analog signal transmission are pushed to the second of its connection through second instance
Realize that output, or all or part of output with short-distance wireless communication mode and/or are not based on mould on the output equipment of system
The wired communication mode of quasi- signal transmission is pushed to the portable computer as second instance, tablet computer, mobile terminal or can
Realize output, or all or part of input with short-distance wireless communication mode and/or non-base on the output equipment of wearable device
It is realized on the input equipment that the wired communication mode of analog signal transmission is pushed to the second system that it is connected to through second instance
Input, or all or part of wire communication for inputting with short-distance wireless communication mode and/or being not based on analog signal transmission
Mode is pushed on the input equipment of the portable computer as second instance, tablet computer, mobile terminal or wearable device
Realize that input, or all or part of input and output with short-distance wireless communication mode and/or are not based on analog signal biography simultaneously
Defeated wired communication mode is pushed on the input-output equipment of the second system of its connection simultaneously through second instance and realizes input
Output, or all or part of input and output with short-distance wireless communication mode and/or are not based on analog signal transmission simultaneously
Wired communication mode is pushed to the defeated of the portable computer as second instance, tablet computer, mobile terminal or wearable device
Enter and realizes input and output on output equipment;
Or
First instance it is being locally stored and/or its connection the first system storage program or there are also data with short distance without
Line communication mode and/or the wired communication mode for being not based on analog signal transmission are pushed to operation or real through second on second instance
Body is pushed to the program that operation and the second instance or the second system on the second system of its connection run above-mentioned push
Using the above-mentioned push of data run of above-mentioned push program when at least will use its input equipment carry out input or using its
Output equipment carries out output or carries out input and output using its input and output device simultaneously, or in the second instance or institute
The first instance in the case that second system has locally had the program of above-mentioned push or the copy of also data is stated not push
Above procedure or there are also the whole of data or to further clarify only push described second real for retrieving the segment of local replica
Body or the second system directly transfer corresponding local replica operation according to the segment of above-mentioned push and at least to use its defeated
Enter equipment to receive input or carry out output using its output equipment or carry out input and output using its input and output device simultaneously.
2. push mode according to claim 1 runs program technic, it is characterised in that:
The first instance is that the communication link established after perceiving the second instance between the two is pushed or gone back
The certification of perception stage is carried out to the second instance in perception and is only established in the case where it is by certification
Communication link between the two carries out push or the first instance is also needed to described the during establishing communication link
Two entities and/or the second instance also need the certification for carrying out the networking stage to the first instance and only all by recognizing
Communication link is just established in the case where card, or further clarifying the first instance is to pass through to the perception of the second instance
It is that active probe mode perceives and/or receive the second instance/non-first instance and second instance third
The signal or further clarify to perceive after specific format/content signal that entity actively issues;Or both between in advance
Communication link has been established and is to receive the second instance/non-described first in fact in the first instance or the first system
If the third entity of body and the second instance actively issues directly being pushed after request push signal and described second
Entity actively issue its receive request push signal and carry out push and be not based on same logical communications links, or and be
What the first instance or the first system end were directly pushed after manual or automatic triggering;
Simultaneously/or after establishing communication link the first instance also needs to obtain from the second instance/second system
License is just pushed, whether the first instance there is the permission for receiving and pushing to carry out to the second instance/second system
Verifying and by verifying just carry out push and/or the second instance/second system be also to the first instance/the first system
It is no that there is the permission pushed to it verify and just be pushed by verifying;
Simultaneously/or the push application second instance in operation or the second system can at any time or will on specific opportunity
The push application for occupying its input equipment or output equipment is closed or is hung up or switches to backstage from front end or from switching to from the background
Front end;
Simultaneously/or push application the second instance/second system of operation is completed and does not retain the program being pushed or not
Retain the data being pushed or does not retain any push running trace of application or do not record whole/portion in push application operation
Divide output or only retains the program being pushed as local replica or only retain the data being pushed as local replica or reservation
All received program and data or record push are inputted or are recorded using all/part in operation and is complete in push application operation
Whole in whole/partial analysis processing result or record push application operation in the output of portion/part or record push application operation/
Whole/part local data access log in part local operation log or record push application operation;
Simultaneously/or the program of push be shell script or to further clarify be autoexec/html file/XML file/general
Leading to text file either binary program or further clarifying is EXE file/command file/dll file/OCX file;
Simultaneously/or the program of push be application program or be system program or be Virus or be trojan horse program;
Simultaneously/or push program be completely or partially encrypted, digital signature, it is by verifying and/or pass through
Third Party Authentication;
Simultaneously/or push products or first pushed there are also data for retrieve the segment of local replica and only described second it is real
Body or the second system just continue to push remaining when can not retrieve local replica according to the segment of above-mentioned push;
Simultaneously/or push data be completely or partially encrypted, be digital signature, comprising all/part push
Program abstract and/or comprising all/part push data abstract;
Simultaneously/or received the program of push or only run can there are also the second instance of data or the second system
The program for the above-mentioned push being decrypted correctly, the program for only using the above-mentioned push of the data run that can be decrypted correctly, only operation energy
By the program of the above-mentioned push of verifying, only use can by verifying above-mentioned push the above-mentioned push of data run program
And/or only run the program for having passed through the above-mentioned push of Third Party Authentication;
Simultaneously/or received the program of push or do not run cannot there are also the second instance of data or the second system
The program for the above-mentioned push being enough decrypted correctly, without using the above-mentioned push of the data run that can not be decrypted correctly program, do not transport
Row cannot by the program of the above-mentioned push of verifying, without using the program of the above-mentioned push of data run of verifying can not be passed through
And/or do not run the program of the above-mentioned push not over Third Party Authentication;
Simultaneously/or the first instance be fixed equipment monomer, semifixed equipment monomer, portable computer, tablet computer, shifting
Dynamic terminal, wearable device or it is other include electronic device or computer installation with communication and processing capacity conduct its
The fixation at least with communication capacity of a part, semifixed, removable or wearable monomer;
Simultaneously/or the second instance be fixed equipment monomer, semifixed equipment monomer, portable computer, tablet computer, shifting
Dynamic terminal, wearable device or it is other include electronic device or computer installation with communication and processing capacity conduct its
The fixation at least with communication capacity of a part, semifixed, removable or wearable monomer;
Simultaneously/or the first system be fixed equipment, semifixed equipment, portable computer, tablet computer, mobile terminal,
Wearable device, other electronic device/computer installations or above system with communication and processing capacity can will be used as it
By the part after the first instance separation when first instance of a part is separated;
Simultaneously/or the second system be fixed equipment, semifixed equipment, portable computer, tablet computer, mobile terminal,
Wearable device, other electronic system/computer systems or above system with communication and processing capacity can will be used as it
By the part after the second instance separation when second instance of a part is separated;
Simultaneously/or the input and output of the program being currently running while being pushed on the input-output equipment of the second instance
Or when be pushed to simultaneously on the input-output equipment for the second system that it is connected to through the second instance, at least push one
Interactive interface carries out visualization and shows, or further clarifies the interactive interface and show at the beginning can limit on an output device
Complete to show to interact without obviously waiting in fixed short period, the interactive interface can be in the screen as output equipment
It can show when curtain locking without unlock, the touch screen that the interactive interface can at the same time as input equipment and output equipment
It can be inputted when locking without unlock, the interactive interface can open voluntarily when the screen as output equipment is closed
Then show and/or the interactive interface can exist automatically in the case where the screen front end as output equipment has other interfaces
Front end shows;
Simultaneously/or the second instance or the second system operation push program or using push data run push
Program and simultaneously using its input and output device carry out input and output when, at least to visualize on an output device and show one
A interactive interface, or further clarifying that the interactive interface shows at the beginning on an output device can be in the short period of restriction
It is interior completion show to interact without obviously waiting, the interactive interface can be when as the screen locking of output equipment
Without unlock can show, the interactive interface can at the same time as the touch screen of input equipment and output equipment lock when without
Need to unlock can input, the interactive interface can as output equipment screen close when open voluntarily then show and/
Or the interactive interface can show in front end automatically in the case where the screen front end as output equipment has other interfaces;
Simultaneously/or the input and output of the program being currently running while being pushed on the input-output equipment of the second instance
Or when being pushed to simultaneously through the second instance on the input-output equipment for the second system that it is connected to, it will not show visual
The interactive interface of change or to further clarify be by corresponding output equipment playing alert tones, opens warning light and/or flashing
It can be inputted by corresponding input equipment after warning light;
Simultaneously/or the second instance or the second system operation push program or using push data run push
Program or operation push program local replica or using push data local replica operation push program sheet
Ground copy and simultaneously using its input and output device carry out input and output when, will not show visual interactive interface or into
One step is clearly by that can pass through phase after corresponding output equipment playing alert tones, unlatching warning light and/or flash for prompting lamp
The input equipment input answered;
Simultaneously/or the second instance or the second system operation push program or using push data run push
Program or operation push program local replica or using push data local replica operation push program sheet
Ground copy, the program are to be run as operating system by its operating system or corresponding thereon by calling
Specialized application software is run;
Simultaneously/or the second instance receive the program of push or be by the firmware program that runs thereon there are also data, belong to
In operating system service routine or be not belonging to operating system service routine is automatic received or also active handle after the receipt
It is run by its operating system as operating system or by calling corresponding specialized application software thereon
Run, or further clarifying is by specified one/more than communication protocol or there are one/be more than a port into
Row is received;
Simultaneously/or the second instance receive the input and/or output of push and be by the firmware program that runs thereon, belong to
The service routine of the operating system or service routine for being not belonging to operating system is automatic received or also active transmission after the receipt
Onto input equipment and/or output equipment, or further clarify be by specified one/more than a communication protocol or also
One/it is more than that a port progress is received;
Simultaneously/or the first instance receive signal and be by the firmware program that runs thereon, belong to the service of operating system
Program or the service routine for being not belonging to operating system it is automatic received or further clarify be by specified one/more than one
Communication protocol or there are one/be more than a port carry out it is received;
Simultaneously/or the output for the program being currently running is pushed on the output equipment of the second instance or through described second
The visualization interface that entity is showed when be pushed on the output equipment of the second system of its connection simultaneously can be with other need
The visualization interface to be showed is shared to be used the same screen as output equipment or further clarifies this and other need to open up
Existing visualization interface is other push applications or operation local program, or is further clarified shared using same
When screen only one interface show in front end or front end show but mutually do not block or at least part do not hidden
Gear;
Simultaneously/or the input for the program being currently running is pushed on the input equipment of the second instance or through described second
Entity is pushed on the input equipment of the second system of its connection when receiving input simultaneously and can use with other procedure sharings
The same input equipment, or further clarify and share using only one program when the same input equipment current by being somebody's turn to do
Input equipment carries out input or is currently carrying out input by the input equipment but respectively receiving different input contents;
Simultaneously/or the output for the program being currently running is pushed on the output equipment of the second instance or through described second
It is exclusive when entity is pushed to simultaneously on the output equipment of the second system of its connection to use relevant output equipment until knot
Beam is perhaps switched to backstage, hangs up or close or further clarify and can be grasped by the operation of specific screen sliding, specific keys
Make, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof is realized will
Front end runs program or other push application switchings to backstage, hang-up or closes;
Simultaneously/or the input for the program being currently running is pushed on the input equipment of the second instance or through described second
Entity is pushed on the input equipment of the second system of its connection to monopolize when receiving input simultaneously and be set using relevant input
It is standby until terminate or be switched to backstage, hang up or close, or further clarify can be operated by specific screen sliding, it is specific by
It is real that key operation, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof
Front end is now run into program or other push application switchings to backstage, hang-up or is closed;
Simultaneously/or the input and/or output for the program being currently running be pushed to the second instance input equipment and/or
It is pushed on output equipment or through the second instance on the input equipment and/or output equipment of the second system of its connection
When, do not stop or do not hang up the second instance or the second system in the program of operation or further clarify will be in front end
The program of operation is switched to backstage, hangs up or close, or further clarifies and can be grasped by the operation of specific screen sliding, specific keys
Make, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof is realized will
Front end runs program or other push application switchings to backstage, hang-up or closes;
Simultaneously/or the input and/or output for the program being currently running be pushed to the second instance input equipment and/or
It is pushed on output equipment or through the second instance on the input equipment and/or output equipment of the second system of its connection
Shi Keyou operation local program or it is other push application or further clarify at this time by front end operation program or its
It pushes application switching to backstage, hang-up or closes, or further clarifies and can be grasped by the operation of specific screen sliding, specific keys
Make, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof is realized will
Front end runs program or other push application switchings to backstage, hang-up or closes;
Simultaneously/or the second instance or the second system operation push program or using push data run push
Program or operation push program local replica or using push data local replica operation push program sheet
Can have the local program of operation or other push to apply or further clarify when ground copy at this time will be in the journey of front end operation
Sequence or other push application switchings to backstage, hang up or close, or further clarify and can be operated by specific screen sliding, is specific
Button operation, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof
It realizes and front end is run into program or other push application switchings to backstage, hang-up or is closed;
Simultaneously/or the second instance or the second system operation push program or using push data run push
Program or operation push program local replica or using push data local replica operation push program sheet
The service being able to access that can be used when ground copy and/or local program can be called or further clarify the local journey that can be called
Other functions that the function and/or running environment that sequence is dynamic link library, control, running environment provide provide;
Simultaneously/or the second instance or the second system preservation push program local replica or there are also push
The local replicas of data be stored in the same memory space for specially marking off and or be stored in different special divisions
In memory space out or further clarify depositing of being able to access that in the program operation of above-mentioned memory space and above-mentioned push
Storage space is the same memory space or the memory headroom run with it is the same memory space;
Simultaneously/or the second instance or the second system operation push program or using push data run push
Program or operation push program local replica or using push data local replica operation push program sheet
Ground copy is specially to mark off in the memory headroom come to run or further clarify the memory headroom and local program fortune at one
The memory headroom of enforcement is well-separated;
Simultaneously/or the second instance or the second system operation push program or using push data run push
Program or operation push program local replica or using push data local replica operation push program sheet
Access is only capable of when ground copy to be stored in the data for the memory space for specially marking off, cannot access and above-mentioned be stored in special division
Data except the data of memory space out are only capable of access and do not pass through by data of Special Empower and/or cannot access
It crosses the data of Special Empower or can further be prompted when accessing the above-mentioned data being able to access that and/or the data that cannot be accessed
And/or it will record access log;
Simultaneously/or the first instance the first system is connected to communication and/or wired communication mode;
Simultaneously/or the second instance second system is connected to communication and/or wired communication mode;
Simultaneously/or the short-distance wireless communication mode be based on Huawei Hlilink, Mesh, ZigBee,
WirelessHART、MiWi、Thread、Z-Wave、LiFi、WiFi、Bluetooth、IrDA、ZigBee、NFC、UWB、DECT
Or the communication of RFID technique;
Simultaneously/or the wired communication mode for being not based on analog signal transmission communication media be twisted pair, coaxial cable,
Optical cable or data line;
Simultaneously/or the second instance can to receive the push of first instance automatically be after opening automatic received switch
Push can just be received automatically or further clarify the automatic received switch can be turned off manually or must be turned off manually
Or can be automatically closed or can only be automatically closed or must open manually or can only automatically open or can open manually can also be with
It automatically opens or can be turned off manually or be automatically closed.
3. push mode according to claim 2 runs program technic, it is characterised in that:
The active probe is led based on radar, computer vision, other sensors, RFID technique or other network technologies
Dynamic detection;
Simultaneously/or the first instance be that the second instance or described first real is perceived by autonomous active probe
Body be contacted/non-contact excitation after just carry out active probe and perceive the second instance;
Simultaneously/or the signal that actively issues of the second instance or the third entity include entity identification information, entity net
Network mark/address information, digital signature information establish network linking relevant information, the other information that can be used for verifying, request to push away
It delivers letters breath, specified request push application message and/or other additional informations;
Simultaneously/or the signal that actively issues of the second instance or the third entity include information completely or partially be plus
It is close or still can decrypt/can not decrypt;
Simultaneously/or the first instance be do not carry out active probe but contacted/non-contact excitation after can just receive
Signal that the second instance or the third entity actively issue and perceived and receiving the second instance or
The first instance is actively to have issued signal and by described first having carried out active probe and thus caused the second instance
Entity receives and perceives the second instance;
Simultaneously/or the active probe strategy be physical trigger detection, signal triggering detection, period active probe, timing
Active probe and/or uninterrupted active probe;
Simultaneously/or the active probe type be radio signal detection and/or be electric signal detection;
Simultaneously/perhaps the function of the active probe need manually or automatically to enable or further clarify manually or from
It is dynamic to enable to be by application entity button, application entity key, application entity switch, operation virtual push button, operation virtual key
And/or operation virtual switch realization;
Simultaneously/perhaps the function of the active probe need manually or automatically to close or further clarify manually
Or it is virtual by application entity button, application entity key, application entity switch, operation virtual push button, operation for being automatically closed
What key and/or operation virtual switch were realized;
/ or wake up the first instance or also wake up it simultaneously and push/executes second described in other functional requirements simultaneously
The signal that entity or the third entity actively issue includes specific content, or is further clarified not specific comprising this
Content can not then wake up the first instance or also wake up it simultaneously and carry out pushing/executing other functions;
/ or wake up the first instance or also wake up it simultaneously and push/executes second described in other functional requirements simultaneously
The signal that entity or the third entity actively issue uses specific format, or further clarifies not specific using this
Format can not then wake up the first instance or also wake up it simultaneously and carry out pushing/executing other functions;
Simultaneously/or the signal of specific format its format for actively issuing of the second instance or the third entity be disclosed
Format or underground format;
Simultaneously/or signal its format for actively issuing of the second instance or the third entity be that the first instance cannot
Recognition and the/required then described first instance are without push;
Simultaneously/or the first instance receive the function of the signal that the second instance or the third entity actively issue and be
It is manually or automatically enabled, or further clarify manually or automatically enable be by application entity button, application entity key,
Application entity switch, operation virtual push button, operation virtual key and/or operation virtual switch are realized;
Simultaneously/or the first instance receive the function of the signal that the second instance or the third entity actively issue can
With what is manually or automatically closed, or further clarifying manually or automatically closing is pressed by application entity button, application entity
What key, application entity switch, operation virtual push button, operation virtual key and/or operation virtual switch were realized;
Simultaneously/or perception stage is carried out to the second instance in perception verifying be based in perception from institute
It states the entity identification information of second instance acquisition, digital signature information, physical network mark/address information and/or can be used for testing
The other information of card;
Simultaneously/or perception stage is carried out to the second instance in perception verifying be based in perception from institute
The encryption information for stating second instance acquisition can be decrypted correctly, be able to carry out retrieval and/or be able to carry out comparison;
Simultaneously/or during establishing communication link the first instance is also needed to the second instance and/or described
Two entities, which also need the verifying for carrying out the networking stage to the first instance, to be verified based on physical network mark/address information
's;
Simultaneously/or establish the first instance after communication link and obtain the license from the second instance/second system and be
First carried out prompt and agree to push in the case where obtain express license or no oppositions push in the case where obtain
Tacit declaration license, or further clarifying the operation for agreeing to push is realized by application entity buttons/keys/switch
Or it is realized by operation virtual push button/key/switch, or further clarifying the operation for opposing push is to pass through behaviour
Make that entity buttons/keys/switch is realized or is realized by operation virtual push button/key/switch;
Simultaneously/or push program or there are also data be completely or partially by symmetric encipherment algorithm or rivest, shamir, adelman
It has encrypted;
Simultaneously/or push program or there are also data be completely or partially by homomorphic encryption algorithm or non-homomorphic encryption algorithm
It encrypts;
Simultaneously/or push program or there are also data be completely or partially by verifying, by analysis and/or using verifying mould
What block was verified;
Simultaneously/or push program or there are also data recognized according to Third Party Authentication label, according to third party
It demonstrate,proves certificate and/or is judged whether using Third Party Authentication module through Third Party Authentication;
Simultaneously/or the first instance to the second instance/second system whether have receive push permission test
The mode of card is to verify User ID/user name, digital signature/digital certificate and/or the mouth of the second instance/second system
Order/password/authorization code, which perhaps further clarifies, all or part of to be needed to input immediately on its input equipment or further bright
Really the input is by keyboard, mouse, touch screen, the key of non-keyboard key, switch, voice, camera shooting and/or other sensors
Induction input;
Simultaneously/or the second instance/second system also to the first instance/the first system whether have to its push
The mode that permission is verified is to verify User ID/user name of the first instance/the first system, digital signature/number card
Book and/or password/password/authorization code or further clarify it is all or part of need to input immediately on its input equipment, or
Person further clarify it is described input be by keyboard, mouse, touch screen, the key of non-keyboard key, switch, voice, camera shooting and/or
Other sensor sensing inputs;
Simultaneously/or the foundation communication link between the two be according to based on being obtained in perception from the second instance
Physical network mark/address information and/or establish network linking relevant information to establish;
Simultaneously/or the first instance is gate input module containing permission partial monosomy, other entrance access control systems contain body
Part recognition unit partial monosomy, other entrance access control system consoles, household electrical appliance, lamps and lanterns, game machine, navigator, intelligence
Household main control device, attendance recorder, cashing machine, POS machine, PIN PAD, ATM, cash recycling system, automatic vending
It is machine, automatic machine, Recharging Machine, automatic ticket checker, self-help inquiry apparatus, self-service printer, aviation self-service check-in equipment, more
Function self-service terminal, other self-service business handling machines, self-service ticketing machine, magnetic stripe card read-write/reader, chip card read-write/
Reader radio frequency read-write/reader, shared bicycle, shares electric vehicle, shares charger baby managing device in charger baby mode, it
Device, the car body automotive electronics of shared commodity are managed in shared commodity, other shared economic models in its shared economic model
Control device, vehicular automotive electronic control device, other device for vehicular electronic, the sub- control device of non-motor vehicle, Qi Tafei
Motor vehicle device for vehicular electronic, electronic controller for electromechanic apparatus, other electromechanical equipment electronic devices, large and medium-sized electromechanical equipment
Console, Console Operated In Medium Or Large Scale Computer Systems, functional mobile phone, smart phone, tablet computer, PDA, laptop, intelligence
Wrist-watch, intelligent spire lamella, ammeter, water meter, gas meter, flow meter or other electronic equipment/computer equipments for needing to realize non-contact access;
Simultaneously/or the second instance be functional mobile phone, smart phone, tablet computer, PDA, laptop, smartwatch
Or intelligent spire lamella;
Simultaneously/or the third entity be functional mobile phone, smart phone, tablet computer, PDA, laptop, smartwatch
Or intelligent spire lamella;
Simultaneously/or the first system be gate, entrance access control system, household electrical appliance, intelligentized Furniture system, attendance system
System, marketing system, shared economic model background support system, electronic government affairs system, bank counter system, bank payment system,
Online payment system, automobile, other motor vehicles, non-motor vehicle, electromechanical equipment, self-help ticket-buying/fetching system, self-service ticketing system
By the first instance when system, SCM system or above system can will be separated as part thereof of first instance
Part after separation;
Simultaneously/or the second system be mobile intelligent terminal, wearable smart machine, tablet computer, portable computer or
Above system can be by the part after separating the second instance when separating as part thereof of second instance;
Simultaneously/or the automatic received switch be that physical switches virtual switch or existing physical switches have virtually again
Switch.
4. the application method that a kind of push mode described in claim 1,2 or 3 runs program technic, it is characterised in that:
Program technic is run using push mode described in claim 1,2 or 3, passes through the second instance or second system
The output equipment of system shows the output of push application, or further clarifying above-mentioned output equipment includes the first instance or institute
State function, user-friendly and/or conducive to realization output information the secrecy that the output equipment of the first system does not have;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, by the second instance or
The input equipment of the second system realizes the input of push application, or further clarifying above-mentioned input equipment includes described the
It is function that the input equipment of one entity or the first system does not have, user-friendly and/or be conducive to realize input information
Secrecy;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, by the second instance or
The input-output equipment of the second system is realized to the program function run on the first instance or the first system
Use, or further clarify above procedure function include the second instance or the second system do not have function,
Comprising the second instance or the second system can not by function that operation program is realized, use can save expense at
This and/or use the consumption that can be reduced to local resource;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, by the second instance or
The sheet of the program of the second system operation push or the program for using the data run of push to push or the program of operation push
Ground copy or the local replica for the program for using the local replica operation of the data of push to push realize above procedure or also number
According to exempt to download, exempt to install and/or exempt from operation and actively run, or further clarify above procedure include the second instance or
Function that the second system does not have passes through verifying/information that certification will not collect local original preservation/letter being originally inputted
Breath is to be conducive to the letter realized information privacy and/or only analyze local original preservation of the processing by encryption by verifying/certification
The information for ceasing/being originally inputted is to be conducive to realize information privacy;
Simultaneously/or push mode described in claim 1,2 or 3 is applied to run program technic, push can be to first system
The application that equipment manipulation, data access, data mart modeling, data transmission and/or the other functions of system or the first instance use,
To be manipulated by the second instance or second system realization to the equipment of the first system or the first instance,
Data access, data mart modeling, data transmission and/or other functions use;
Simultaneously/or push mode described in claim 1,2 or 3 is applied to run program technic, push can be to first system
Authentication, authorization and/or the application of authentication of system or the first instance, to pass through the second system or described second
Entity realizes the authentication, authorization and/or authentication of the first system or the first instance to it;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, push the second system or
The second instance for the first system or the first instance provide its data access, data mart modeling, data transmission and/or
The application that other functions use, to realize the second system or the second instance for the first system or described first
Entity provides its data access, data mart modeling, data transmission and/or other functions and uses;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, push the first system or
What instant messaging interaction and/or operation between the first instance and the second system or the second instance cooperateed with answers
With realizing that instant messaging between the first system or the first instance and the second system or the second instance is handed over
Mutually and/or operation cooperates with.
5. the application method that push mode according to claim 4 runs program technic, it is characterised in that:
Push mode described in claim 1,2 or 3 is run into program technic and is applied to shared bicycle, shared automobile, shared electricity
It is described in dynamic bicycle, shared clothes, shared charger baby, shared basketball, shared umbrella or the application of shared massage armchair business model
First instance is above-mentioned shared bicycle, shared automobile or shared electric bicycle or shared clothes, shared charger baby, shared basket
The managing device of ball, shared umbrella or shared massage armchair, the second instance are smart phone, tablet computer or smartwatch,
The entity button for pressing the first instance excites the first instance active probe and perceives the second instance or by institute
Stating second instance and being put into makes the first instance perceive described second in fact within the scope of the effectively perceive of the first instance
Body, the communication linkage and then the first instance then established between the two use shared object to second instance push request
The application of product or to further clarify be that the input and output of the corresponding program run on the first instance are pushed to described the
It will run on the input-output equipment of two entities or in corresponding program/program and data-pushing to the second instance, user
The interactive interface application that can be showed by the input-output equipment of the second instance uses real as described first accordingly
The sharing articles of body or the sharing articles of the first instance management, and after submitting application default while having submitted user information
Being verified agreement in user information, it can be used or also require its corresponding password/password/authorization code/biological characteristic of input
And agree to that it can be used or and is submitting application but while after submitting user information do not requiring also its defeated after being verified
Enter corresponding user information and/or password/password/authorization code/biological characteristic and agree to after being verified its can be used or
It is automatic/licensed read the user information that locally saves or need to also read the corresponding user information locally saved and/or
Password/password/digital certificate/authorization code/biological characteristic simultaneously agrees to that it can be used or automatic/licensed after being verified
It reads the user information locally saved or need to also read local corresponding hardware attributes information/software setting information and verify
Agree to that it can be used by rear, user can be used directly corresponding sharing articles or mention according to it when agreeing to that it can be used
For relevant information go to obtain the use of corresponding sharing articles or further the relevant information is unlocking pin/authorization code;
Or push mode described in claim 1,2 or 3 is run into program technic applied in mobile payment application, described the
One entity is that bank settlement device or its front end portion with communication function, the second instance are in above-mentioned mobile payment application
Smart phone, tablet computer or smartwatch, the entity button for pressing the first instance excite the first instance actively to visit
Surveying and perceive the second instance or being put into the second instance makes within the scope of the effectively perceive of the first instance
The first instance perceives the second instance, then establish communication linkage between the two then the first instance to institute
Stating the application of second instance push mobile payment or further clarifying is the corresponding program that will be run on the first instance
Input and output are pushed on the input-output equipment of the second instance or by corresponding program/program and data-pushing described in
It is run on second instance, user can be collected money by the interactive interface that the input-output equipment of the second instance shows
And/or payment, or further clarify and directly inputting collecting account information or further clarifying the collecting account information
Gathering can be completed for bank account Receiving information/online payment platform account Receiving information or directly inputting payment account
Family information and/or have submitted corresponding password/password/authorization code/biological characteristic payment authorization information and after being verified
Can be completed payment or it is automatic/licensed read after the collecting account information that locally saves or need to also read it is local corresponding
Hardware attributes information/software setting information and after being verified after can be completed gathering or in automatic/licensed reading
The payment account information that locally saves also needs to read the corresponding password/password/digital certificate/authorization code/life locally saved
The payment authorizations such as object feature information and after being verified after payment can be completed or in the local preservation of automatic/licensed readings
Payment account information or also need to read and demonstrate corresponding hardware attributes information/software setting information and after being verified
After can be completed payment or interactive interface operation after call local network on payment function and its payment interface have input pay
Money account information and/or have submitted payment authorizations information such as corresponding password/password/authorization code/biological characteristic and logical in verifying
Later payment can be completed or without inputting any information;
Or claim 1,2 or the 3 push modes are run into program technic and opened applied to electronic safety lock or access control system
The Central Shanxi Plain, the first instance are the front end portion of above-mentioned electronic safety lock, access control system or the controllable lockmaking of access control system, described the
Two entities are mobile phone, tablet computer or smartwatch, and the entity button for pressing the first instance excites the first instance master
It is dynamic to detect and perceive the second instance or the second instance is put into the effectively perceive range close to the first instance
The interior or described second instance, which operates sending specific format/content signal by software/hardware thereon, makes the first instance sense
Know the second instance, the communication linkage and then the first instance then established between the two are pushed to the second instance
The application of lock control or to further clarify be that the input and output of the corresponding program run on the first instance are pushed to institute
It states on the input-output equipment of second instance or will be run in corresponding program/program and data-pushing to the second instance,
The control that user can be locked by the interactive interface that the input-output equipment of the second instance shows, and having input phase
Password/password/authorization code/biological characteristic for answering and after being verified or also it is required to provide corresponding user information can be real
Now to the control of lock;
Or by claim 1,2 or the 3 push modes run program technic applied to TV, set-top box, sound equipment, refrigerator,
The mechanical, electrical rice cooker of air-conditioning, media player, heating control, electric oven, electric fan, sweeping robot, camera, electrically driven curtain, sky
In the remote control application of gas purifier or other household electrical appliance, the first instance is above-mentioned TV, set-top box, sound equipment, refrigerator, sky
The mechanical, electrical rice cooker of tune, media player, heating control, electric oven, electric fan, sweeping robot, camera, electrically driven curtain, air
Clarifier or other household electrical appliance, the second instance are mobile phone, tablet computer or smartwatch, press the first instance
Entity button excites the first instance active probe and perceives the second instance or be put into the second instance close
Within the scope of the effectively perceive of the first instance or the second instance by the operation of software/hardware thereon issue specific format/
The signal of content makes the first instance perceive the second instance, and the communication linkage then established between the two is then described
It is that will transport on the first instance that first instance, which is applied or further clarified to second instance push household appliance remote control,
The input and output of capable corresponding program be pushed on the input-output equipment of the second instance or by corresponding program/program and
It is run on data-pushing to the second instance, the interaction that user can be showed by the input-output equipment of the second instance
The remote control to household electrical appliance is realized at interface, or is further clarified and needed to input user information before being remotely controlled or also require it
It inputs corresponding password/password/authorization code/biological characteristic and is locally protected after being verified or in automatic/licensed reading
The user information deposited or the corresponding user information and/or password/password/digital certificate/authorization that need to also locally be saved in reading
Code/biological characteristic simultaneously reads the user information that locally saves or need to also read after being verified or automatic/licensed
Local corresponding hardware attributes information/software setting information simultaneously can be just remotely controlled after being verified;
Or claim 1,2 or the 3 push modes are run into program technic applied to ATM machine, the number of taking machine, ticket taking machine, purchase
Ticket machine, top-up machines or other self-service business handling machines non-contact are in use, the first instance is above-mentioned ATM machine, self-service looks into
Inquiry machine, the number of taking machine, ticket taking machine, booking machine, top-up machines or other self-service business handling machines, the second instance are mobile phone, plate
Computer or smartwatch, the entity button for pressing the first instance excite the first instance active probe and perceive described
The second instance is put within the scope of the effectively perceive close to the first instance or the second instance leads to by second instance
Crossing the sending specific format/content signal of software/hardware operation thereon makes the first instance perceive the second instance, so
The communication linkage and then the first instance established afterwards between the two push the non-of self-service business handling machine to the second instance
It is that the input and output of the corresponding program run on the first instance are pushed to institute that touch operation, which is applied or further clarified,
It states on the input-output equipment of second instance or will be run in corresponding program/program and data-pushing to the second instance,
User can be realized by the interactive interface that the input-output equipment of the second instance shows to above-mentioned self-service business handling machine
Touchless manipulation, or further clarify and need to input user information before being remotely controlled or also require its input corresponding close
Code/password/authorization code/biological characteristic and the user information locally saved after being verified or in automatic/licensed reading
Or need to also it read the corresponding user information locally saved and/or password/password/digital certificate/authorization code/biological characteristic simultaneously
It reads the user information that locally saves after being verified or automatic/licensed or need to also read local corresponding hardware
Attribute information/software setting information simultaneously just can be carried out Touchless manipulation after being verified;
Or claim 1,2 or the 3 push modes are run into program technic and are applied to closely using function in,
It is desktop computer, portable computer, mobile phone, tablet computer or smartwatch that the first instance, which is entity, described second
Entity is mobile phone, tablet computer or smartwatch, and the entity button for pressing the first instance excites the first instance actively
It detects and perceives the second instance or the second instance is put within the scope of the effectively perceive of the first instance
Or the second instance issues specific format/content signal by the operation of software/hardware thereon or is connected with specific data line
Connecing the first instance and the second instance makes the first instance perceive the second instance, then establishes between the two
Communication linkage then the first instance to the second instance push closely using function application or further it is bright
The input and output of the corresponding program run on the first instance are really pushed to the input-output equipment of the second instance
It will run above or in corresponding program/program and data-pushing to the second instance, user can pass through the second instance
The interactive interface that shows of input-output equipment realize the short distance of the first instance function used or further clarified
Above-mentioned function is the function and/or be the function that its peripheral hardware has that the first instance host itself has, or further bright
It really needs to input user information before carrying out short distance use or it is also required to input corresponding password/password/authorization code/biology
It feature and reads the user information that locally saves after being verified or automatic/licensed or need to also read local save
Corresponding user information and/or password/password/digital certificate/authorization code/biological characteristic and after being verified or from
It is dynamic/licensed to read the user information locally saved or also read local corresponding hardware attributes information/software setting letter
It ceases and just can be carried out after being verified and closely use;
Or claim 1,2 or the 3 push modes are run into program technic and are applied in the closely application of reading, it is described
First instance is that the ammeter that entity is electronization, water meter, gas meter, flow meter, the gauge table of other inconvenient meter readings or other sensors are read
Number device, the second instance are mobile phone, tablet computer or smartwatch, are pressed described in the entity button excitation of the first instance
First instance active probe simultaneously perceives the second instance or the second instance is put into having close to the first instance
In effect sensing range or the second instance is issued described in specific format/content signal makes by the operation of software/hardware thereon
First instance perceives the second instance, then establish communication linkage between the two then the first instance to described the
It is the defeated of the corresponding program that will be run on the first instance that two entities, which push the closely application of reading or further clarify,
Enter output to be pushed on the input-output equipment of the second instance or by corresponding program/program and data-pushing to described the
Two physically run, and user can be realized by interactive interface that the input-output equipment of the second instance shows to described the
The short distance of one entity is read, or is further clarified and needed to input user information before carrying out short distance use or also require it
It inputs corresponding password/password/authorization code/biological characteristic and is locally protected after being verified or in automatic/licensed reading
The user information deposited or the corresponding user information and/or password/password/digital certificate/authorization that need to also locally be saved in reading
Code/biological characteristic simultaneously reads the user information that locally saves or need to also read after being verified or automatic/licensed
Local corresponding hardware attributes information/software setting information simultaneously just can be carried out closely reading after being verified.
6. a kind of method for protecting information security, it is characterised in that:
Program technic or push mode described in claim 4 or 5 are run from push mode described in claim 1,2 or 3
Running all or part of input in the application method of program technic is the input equipment by second instance or second system
The input equipment of non-first instance or the first system itself carries out input to be conducive to realize what the secrecy for inputting information extracted
All or part of input is by from separating with itself or another carry out input in additional input terminal itself or further expand
The input terminal is believable;
Simultaneously/either program technic or described in claim 4 or 5 is run from push mode described in claim 1,2 or 3
It is by by second instance or second system that push mode, which runs all or part of output in the application method of program technic,
Input equipment rather than the output equipment of first instance or the first system itself carries out output to be conducive to realize output information
The all or part of output extracted that maintains secrecy be from it is being separated with itself or it is another additional output end itself carry out output or into
It is believable that one step, which expands the output end,;
Simultaneously/either program technic or described in claim 4 or 5 is run from push mode described in claim 1,2 or 3
It is by testing that it is by the program of verifying extracted that push mode, which runs the program of the push in the application method of program technic,
Card and combine expand can confirm that the program can protect information security or further clarify that can confirm by verifying will not
It is not authorized access locally save information, licensed will not pass the information locally saved that can be decrypted correctly back, will not
The not licensed information for passing the local input that can be decrypted correctly back, will not the local that can be decrypted correctly of licensed preservation it is defeated
The information that enters only passes the information locally saved that cannot be decrypted correctly, the letter for only passing the local input that cannot be decrypted correctly back back
Breath only saves the information locally saved that cannot be decrypted correctly and/or only saves the information for the local input that cannot be decrypted correctly;
Simultaneously/either program technic or described in claim 4 or 5 is run from push mode described in claim 1,2 or 3
The program that push mode runs the push in the application method of program technic is to be by the program of Third Party Authentication extracted
By Third Party Authentication and combine expand can be confirmed by Third Party Authentication can protect information security or further it is bright
Can really confirm authorized will not access the information locally saved, licensed will not pass the local preservation that can be decrypted correctly back
Information, licensed will not pass the local input that can be decrypted correctly back information, will not licensed preservation can be correct
The information of the local input of decryption only passes the information locally saved that cannot be decrypted correctly back, only passes back and cannot be decrypted correctly
The information of local input only saves the information locally saved that cannot be decrypted correctly and/or only saves the sheet that cannot be decrypted correctly
The information of ground input.
7. the method for protection information security according to claim 6, it is characterised in that:
The information locally saved that cannot be decrypted correctly passed back or saved be use homomorphic encryption algorithm to encrypt still can be with
It is analyzed and processed in the case of non-decrypting;
Simultaneously/or the information of the local input that cannot be decrypted correctly passing back or save encrypted using homomorphic encryption algorithm
Still it can be analyzed and processed in the case of non-decrypting;
Simultaneously/or input terminal is pushed to after user authentication relevant information is pushed to or is encrypted when carrying out user authentication
To carry out user authentication or further clarify the user authentication relevant information to be except user name/user name is other in input terminal
Information, digital signature, digital certificate, password, password or the authorization code or above-mentioned that user authentication except equivalent information needs
It is information that user authentication in addition to the other equivalent informations of user name/user name needs, digital signature, digital certificate, password, close
Code or authorization code are to be pushed to input terminal again after being retrieved according to the other equivalent informations of user name/user name;
Simultaneously/or the information one that will with the information of local input and/or locally be saved when carrying out information analysis processing
With the information being analyzed and processed input terminal is pushed to or is pushed to after encrypting to be analyzed and processed in input terminal;
Simultaneously/or when carrying out user authentication by user authentication relevant information and local input related with user authentication
Information be pushed to or be pushed to after encrypting together third party together user authentication or further clarify in third party
The user authentication relevant information is the information of the user authentication needs in addition to the other equivalent informations of user name/user name, number
Word signature, digital certificate, password, password or authorization code or the above-mentioned use in addition to the other equivalent informations of user name/user name
Information, digital signature, digital certificate, password, password or the authorization code that family certification needs are other according to the user name/user name
Equivalent information is pushed to input terminal after being retrieved again;
Simultaneously/or when carrying out information analysis processing by need analyze processing information and local input information and/
Or the information locally saved is pushed to or is pushed to after encrypting together third party together to be analyzed and processed in third party;
Simultaneously/or the information of the above-mentioned local input that cannot be decrypted correctly be only applicable to personal information and/or personal hidden
It is structured message and/or unstructured information that personal letter, which ceases or further clarify above- mentioned information,;
Simultaneously/or the above-mentioned information locally saved that cannot be decrypted correctly is only applicable to personal information and/or individual is hidden
It is structured message and/or unstructured information that personal letter, which ceases or further clarify above- mentioned information,.
8. the application method of the method for protection information security described in a kind of claim 6 or 7, it is characterised in that:
By in the approach application of protection information security described in claim 6 or 7 to B/S mode or the software systems of C/S model,
It is allowed in the software section of user terminal operation will not authorized access local by verifying or Third Party Authentication confirmation
The information of preservation licensed will not pass that the information locally saved that can be decrypted correctly, licensed will not pass back can back
The information for the local input being decrypted correctly, will not the local input that can be decrypted correctly of licensed preservation information, only pass back
The information locally saved that cannot be decrypted correctly, the information for only passing the local input that cannot be decrypted correctly back, only preservation cannot be just
The information locally saved really decrypted and/or the information for only saving the local input that cannot be decrypted correctly;
Or by the software system of the approach application of protection information security described in claim 6 or 7 to B/S mode or C/S model
On system, user authentication be user terminal complete or further clarify be backstage according to user terminal input user name or its
Its equivalent information is pushed to user terminal from being retrieved after relevant authentication information is pushed to or encrypts in background user authentication information
Completion compared with carrying out analysis with other information related with user authentication of user terminal input again;
Or by the software system of the approach application of protection information security described in claim 6 or 7 to B/S mode or C/S model
On system, user authentication be third party complete or further clarify be backstage according to user terminal input user name or its
Its equivalent information retrieves relevant authentication information from background user authentication information and recognizes with the other and user that user terminal inputs
It demonstrate,proves related information and is pushed to or is pushed to after encrypting together third party together and carry out analyzing again and compare completion;
Or by the software system of the approach application of protection information security described in claim 6 or 7 to B/S mode or C/S model
On system, it is encryption that information collection, which is in user terminal completion and wherein collected personal information and/or individual privacy information,
Be stored in third party, need using when file a request to the third party and corresponding information to be decrypted by third party and execute phase
The processing or the non-decrypting processing directly executed answered, or further clarifying is that will provide after the video image information specified decryption
To judicial authority, will by wherein in plain text save specified E-mail address information send mail, will wherein be added with homomorphic encryption algorithm
Close specify information directly carries out calculation process simultaneously feedback result or the phone number that will wherein specify in the case of non-decrypting
Short message is sent after code information decryption.
9. a kind of device realized push mode described in claim 1,2 or 3 and run program technic, it is characterised in that: include
As first instance driving means or further clarify the driving means be fixed equipment, semifixed equipment, portable meter
Calculation machine, tablet computer, mobile terminal or wearable device and as second instance reception driving means or further clarify
The reception driving means is portable computer, tablet computer, mobile terminal or wearable device, or also comprising with described the
Second described in the push source device of the first system as described in of one entity connection and/or the conduct being connected to the second instance
The push destination apparatus of system, the whole for the program that first instance is currently running the first system of itself and/or its connection or
Part output is with short-distance wireless communication mode and/or is not based on the wired communication mode of analog signal transmission and pushes away through second instance
It is sent on the output equipment of the second system of its connection and realizes output, or all or part of output is with short-distance wireless communication side
Formula and/or the wired communication mode for being not based on analog signal transmission are pushed to the portable computer as second instance, plate electricity
Realize that output, or all or part of input are led to short-distance wireless on the output equipment of brain, mobile terminal or wearable device
Letter mode and/or it is not based on the second system that the wired communication mode of analog signal transmission is pushed to its connection through second instance
Realize that input, or all or part of input with short-distance wireless communication mode and/or are not based on analog signal on input equipment
The wired communication mode of transmission is pushed to the portable computer as second instance, tablet computer, mobile terminal or wearable sets
Realize input on standby input equipment, or all or part of input and output are simultaneously with short-distance wireless communication mode and/or non-
It is pushed to the input and output of the second system of its connection simultaneously through second instance based on the wired communication mode of analog signal transmission
Realize that input and output, or all or part of input and output with short-distance wireless communication mode and/or are not based on simultaneously in equipment
The wired communication mode of analog signal transmission be pushed to the portable computer as second instance, tablet computer, mobile terminal or
Input and output are realized on the input-output equipment of wearable device;
Or
Comprising the driving means as first instance or further clarifies the driving means and be fixed equipment, semifixed set
Standby, portable computer, tablet computer, mobile terminal or wearable device and as second instance reception driving means or into
The clearly described reception driving means of one step is portable computer, tablet computer, mobile terminal or wearable device, or also includes
The push source device for the first system as described in being connected to the first instance and/or the conduct being connected to the second instance
The push destination apparatus of the second system, first instance is the first system storage be locally stored and/or its connection
Program or there are also data with short-distance wireless communication mode and/or to be not based on the wired communication mode of analog signal transmission and be pushed to
Operation or be pushed on the second system of its connection through second instance is run and the second instance or described the on second instance
Two system runs the program of above-mentioned push or at least to use it when using the program of the above-mentioned push of data run of above-mentioned push
Input equipment carries out input or export using its output equipment or input using its input and output device simultaneously defeated
Out, or locally there has been the program of above-mentioned push in the second instance or the second system or there are also the copies of data
In the case of the first instance do not push above procedure or there are also data whole or further clarify only push for retrieval this
The segment of ground copy and the second instance or the second system directly transfer corresponding local according to the segment of above-mentioned push
Copy runs and its input equipment at least to be used to receive input or carry out output using its output equipment or use its defeated simultaneously
Enter and carries out input and output with output equipment.
10. a kind of sending signal specific distinguishes RFID approach, it is characterised in that:
Push mode as claimed in claim 3 is run the wake-up first instance in program technic or also wakes up it simultaneously and is pushed away
The signal for sending/executing other functional requirement second instances or third entity actively to issue includes specific content and/or uses special
First instance in fixed format is clearly that signal is received based on RFID technique, is thus extracted by the inclusion of specific interior
Hold and/or wakes up RFID realization using the signal of specific format to the recognition of RFID or further clarify not comprising spy
Fixed content and/or then the signal can not wake up the RFID and realize recognition to the RFID using the specific format, or
Also requiring specific content should be in the foremost portion of whole signals and/or the frequency range of the frequency range and RFID feedback that issue signal
Different;
Or in front on the basis of, the RFID include can be directly used for determine the time data, can be directly used for determine position
Data and/or can be directly used for execute instruction or further clarify the RFID be by association clock can be direct to obtain
Determine the data of time, the RFID be by coordinate interrelation module with obtain can be directly used for determine position data and/
Or the RFID is by associated instructions generator or command memory to obtain the instruction that can be directly used for executing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810912452.5A CN109151012A (en) | 2018-08-11 | 2018-08-11 | A kind of push mode runs program technic and its application method, correlation technique |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810912452.5A CN109151012A (en) | 2018-08-11 | 2018-08-11 | A kind of push mode runs program technic and its application method, correlation technique |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109151012A true CN109151012A (en) | 2019-01-04 |
Family
ID=64792953
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810912452.5A Pending CN109151012A (en) | 2018-08-11 | 2018-08-11 | A kind of push mode runs program technic and its application method, correlation technique |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109151012A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110522595A (en) * | 2019-08-28 | 2019-12-03 | 上海幸卓智能科技有限公司 | A kind of massage armchair function control data creation method and system, terminal |
CN111262884A (en) * | 2020-03-16 | 2020-06-09 | 陈力 | Smart home access authorization method and device, smart home system and server |
WO2020155014A1 (en) * | 2019-01-31 | 2020-08-06 | 华为技术有限公司 | Smart home device sharing system and method, and electronic device |
CN111984955A (en) * | 2020-08-20 | 2020-11-24 | 浙江荣泰健康电器有限公司 | Use method of shared massage chair |
WO2021109309A1 (en) * | 2019-12-04 | 2021-06-10 | 上海擎感智能科技有限公司 | Information processing method, device, and computer storage medium |
CN113784324A (en) * | 2020-05-22 | 2021-12-10 | 西蒙电气(中国)有限公司 | Convenient access method for realizing intelligent device containing Bluetooth beacon |
TWI769712B (en) * | 2021-02-24 | 2022-07-01 | 旺玖科技股份有限公司 | System and method for achieving display of carplay operation interface on display screens of multiple electronic devices integrated in motor-driven transportation means |
WO2023020393A1 (en) * | 2021-08-18 | 2023-02-23 | 华为技术有限公司 | Method for sharing remote controller between devices, and sending end device and receiving end device |
TWI800791B (en) * | 2020-08-19 | 2023-05-01 | 大陸商中國銀聯股份有限公司 | Biometric information-based authentication method, device, computer system, and computer-readable storage medium |
US11676432B2 (en) | 2020-03-17 | 2023-06-13 | Sony Group Corporation | Electronic device, an access control device, and related methods |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101605332A (en) * | 2009-06-26 | 2009-12-16 | 北京鼎盛光华科技有限责任公司 | Vehicle multi-mode wireless network communication system |
US7715873B1 (en) * | 2006-06-23 | 2010-05-11 | Sprint Communications Company L.P. | Wearable accessories providing visual indicia of incoming events for wireless telecommunications device |
CN104506534A (en) * | 2014-12-25 | 2015-04-08 | 青岛微智慧信息有限公司 | Safety communication secret key negotiation interaction scheme |
CN104754514A (en) * | 2015-03-26 | 2015-07-01 | 广东欧珀移动通信有限公司 | File push method and device and file receiving method and device |
CN104767775A (en) * | 2014-01-06 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Webpage application information push method and webpage application information push system |
CN106133684A (en) * | 2014-03-27 | 2016-11-16 | 微软技术许可有限责任公司 | Support the dynamic behaviour in static compilation program |
CN107145278A (en) * | 2016-03-01 | 2017-09-08 | 阿里巴巴集团控股有限公司 | Apparatus control method, device and mobile terminal based on mobile terminal |
CN107491795A (en) * | 2016-06-13 | 2017-12-19 | 摩托罗拉移动有限责任公司 | Silent RFID states and recovery |
-
2018
- 2018-08-11 CN CN201810912452.5A patent/CN109151012A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7715873B1 (en) * | 2006-06-23 | 2010-05-11 | Sprint Communications Company L.P. | Wearable accessories providing visual indicia of incoming events for wireless telecommunications device |
CN101605332A (en) * | 2009-06-26 | 2009-12-16 | 北京鼎盛光华科技有限责任公司 | Vehicle multi-mode wireless network communication system |
CN104767775A (en) * | 2014-01-06 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Webpage application information push method and webpage application information push system |
CN106133684A (en) * | 2014-03-27 | 2016-11-16 | 微软技术许可有限责任公司 | Support the dynamic behaviour in static compilation program |
CN104506534A (en) * | 2014-12-25 | 2015-04-08 | 青岛微智慧信息有限公司 | Safety communication secret key negotiation interaction scheme |
CN104754514A (en) * | 2015-03-26 | 2015-07-01 | 广东欧珀移动通信有限公司 | File push method and device and file receiving method and device |
CN107145278A (en) * | 2016-03-01 | 2017-09-08 | 阿里巴巴集团控股有限公司 | Apparatus control method, device and mobile terminal based on mobile terminal |
CN107491795A (en) * | 2016-06-13 | 2017-12-19 | 摩托罗拉移动有限责任公司 | Silent RFID states and recovery |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020155014A1 (en) * | 2019-01-31 | 2020-08-06 | 华为技术有限公司 | Smart home device sharing system and method, and electronic device |
CN113272745A (en) * | 2019-01-31 | 2021-08-17 | 华为技术有限公司 | Smart home equipment sharing system and method and electronic equipment |
CN110522595A (en) * | 2019-08-28 | 2019-12-03 | 上海幸卓智能科技有限公司 | A kind of massage armchair function control data creation method and system, terminal |
WO2021109309A1 (en) * | 2019-12-04 | 2021-06-10 | 上海擎感智能科技有限公司 | Information processing method, device, and computer storage medium |
CN111262884A (en) * | 2020-03-16 | 2020-06-09 | 陈力 | Smart home access authorization method and device, smart home system and server |
CN111262884B (en) * | 2020-03-16 | 2021-06-11 | 佛山市诚名信息科技有限公司 | Smart home access authorization method and device, smart home system and server |
US11676432B2 (en) | 2020-03-17 | 2023-06-13 | Sony Group Corporation | Electronic device, an access control device, and related methods |
CN113784324A (en) * | 2020-05-22 | 2021-12-10 | 西蒙电气(中国)有限公司 | Convenient access method for realizing intelligent device containing Bluetooth beacon |
TWI800791B (en) * | 2020-08-19 | 2023-05-01 | 大陸商中國銀聯股份有限公司 | Biometric information-based authentication method, device, computer system, and computer-readable storage medium |
CN111984955A (en) * | 2020-08-20 | 2020-11-24 | 浙江荣泰健康电器有限公司 | Use method of shared massage chair |
TWI769712B (en) * | 2021-02-24 | 2022-07-01 | 旺玖科技股份有限公司 | System and method for achieving display of carplay operation interface on display screens of multiple electronic devices integrated in motor-driven transportation means |
WO2023020393A1 (en) * | 2021-08-18 | 2023-02-23 | 华为技术有限公司 | Method for sharing remote controller between devices, and sending end device and receiving end device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109151012A (en) | A kind of push mode runs program technic and its application method, correlation technique | |
EP3312750B1 (en) | Information processing device, information processing system, and information processing method | |
US10198598B2 (en) | Information processing device and method, program, and recording medium | |
CN1918526B (en) | Information management device and information management method | |
CN104915829B (en) | Exchange method and device are applied based on NFC technique | |
JP2010533344A (en) | Identity authentication and protection access system, components, and methods | |
JP2010505161A5 (en) | ||
CN104050510A (en) | Intelligent room reservation system based on mobile terminal | |
CN104794388B (en) | application program access protection method and application program access protection device | |
KR20150110515A (en) | Method for authentication a user with respect to a machine | |
KR20150090099A (en) | Nfc-based fingerprint authentication system and fingerprint authentication method | |
CN105827656B (en) | Identity identifying method and device based on NFC payment | |
CN103081411A (en) | Network service | |
CN103942897A (en) | Method for money withdrawing without card on ATM | |
CN105205944A (en) | Self-service deposit and withdrawal system based on intelligent terminal | |
CN111860016A (en) | Information display method and device for Near Field Communication (NFC) and electronic equipment | |
WO2019114782A1 (en) | Cloud biometrics authentication payment and retail management system, and payment method | |
CN109166216A (en) | A kind of control method and device of smart bluetooth door lock | |
CN105701386A (en) | Security certification method and device | |
CN101019366A (en) | Method for realizing volatile secret key and separated checking module by collecting human characteristic | |
CN101615318A (en) | E-payment system and device thereof | |
CN113382405A (en) | Network space information security control method and application | |
CN109640297A (en) | No card interactive system and simulation card apparatus | |
CN101577656A (en) | Control display and network system substituting integrated circuit card | |
CN106910068B (en) | Multi-algorithm multi-key optical authentication offline payment method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190104 |