CN109151012A - A kind of push mode runs program technic and its application method, correlation technique - Google Patents

A kind of push mode runs program technic and its application method, correlation technique Download PDF

Info

Publication number
CN109151012A
CN109151012A CN201810912452.5A CN201810912452A CN109151012A CN 109151012 A CN109151012 A CN 109151012A CN 201810912452 A CN201810912452 A CN 201810912452A CN 109151012 A CN109151012 A CN 109151012A
Authority
CN
China
Prior art keywords
instance
push
program
input
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810912452.5A
Other languages
Chinese (zh)
Inventor
倪子妍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Yipaike Network Technology Co Ltd
Original Assignee
Ningbo Yipaike Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Yipaike Network Technology Co Ltd filed Critical Ningbo Yipaike Network Technology Co Ltd
Priority to CN201810912452.5A priority Critical patent/CN109151012A/en
Publication of CN109151012A publication Critical patent/CN109151012A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The present invention provides a kind of push mode and runs program technic, first instance using the input and output for the program being currently running through second instance be pushed to its connection second system or be pushed directly to portable computer as second instance, tablet computer, input and output are carried out on the input-output equipment of mobile terminal or wearable device, it is also possible to program or is pushed on the second system of its connection there are also operation on data-pushing to second instance or through second instance run and its input equipment at least to be used to carry out input or export using its output equipment or carry out input and output using its input and output device simultaneously.Push mode of the invention runs that program technic may be implemented to operate convenient, information privacy, function uses and program exempts from downloading and exempt from installation to exempt from operation actively operation etc..It the present invention also provides the application method of the above method, realizes the device of the above method, and has refined a kind of method of protection information security, a kind of sending signal specific recognition RFID approach.

Description

A kind of push mode runs program technic and its application method, correlation technique
Technical field
The invention belongs to information technology fields more particularly to a kind of push mode to run program technic and its utilization side Method further relates to a kind of device, a kind of method and a kind of sending for protecting information security for realizing that push mode runs program technic Signal specific distinguishes RFID approach.
Background technique
There is one group of camera lens in April, 2018 inside the film " player behind the scenes " that China shows, the clock off year of Xu Zhengyan returns On cell doorway, stretched head hand inputs password enablings on access control in vehicle when family, both inconvenience or dangerous.In reality, Many units and cell are then the forms of card that uses, or hold and swipe the card (personnel enter and leave also in this way), or card is fixed Onboard can in a certain distance automatic identification, to facilitate, especially latter, but this mode is only recognized card and do not recognized People can equally be used to enter and leave if card or stolen with truck.Some units and cell are by the way of verifying biological characteristic (such as fingerprint, iris, face), but the case where there is also can forge and (such as be forged with fingerprint hand film, photo), and it is right In verifying living body or verify whether it is technically voluntarily to be difficult to solve the problems, such as (such as the apple hand of new generation of support brush face Machine can brush the unlock of its face in owner during sleep).Currently, mobile application is surging forward, life is greatly facilitated in many fields, But it actually uses or there are some problems.For example, the use of shared bicycle, from unlock mobile phone, opens corresponding APP entrance Unlocking pin is obtained to barcode scanning interface and barcode scanning to unlock again, needs cumbersome operation and longer waiting time.Mobile payment It is also such.The concepts such as intelligent appliance, smart home become more and more popular at present, and control is also a problem, according to general Software control, there is the similar problem of front mobile payment, then need cumbersome operation and longer waiting time, if General software control is not used, then a kind of household electrical appliances or a kind of scene just need an APP, further increase trouble.ATM in bank It is having that installation camera takes on the sly, have additional equipment steal information there are many problems, or even there are also the ATM machine of personation, that is, calculate There is no security risk, it is also pretty troublesome that people's multimachine will be lined up when few.Other public service facilities are also in this way, such as government's machine Close the self-service equipment at administrative services center, financial service site, library etc..As the information technologies such as internet are permeated Daily life is deeper and deeper and the technology and means of some information collections (such as brush face brush finger line swipe the card brush identity card) application is got over Come more universal, the problem of information security is more and more prominent, without agreeing to or authorization acquisition, use, propagate personal information or even hidden The case where personal letter ceases is impossible to guard against, in an unguarded moment or without notice, is stored in mobile phone, private information (such as account, close on computer Code, telephone number, address list, photo) it is just easily just whole by certain websites (passing through its procedure site and cell phone application etc.) It takes away, recording operation behavior and habit, then advertisement brings puzzlement, or even is directly or indirectly used for personal information illegal In criminal activity, serious infringement right of privacy etc..
Summary of the invention
It is an object of the invention to solve aforesaid operations are inconvenient, information security there are hidden danger the problems such as, provide first one Kind of push mode runs program technic, by input and output being pushed out through second instance or even program tape data also push It goes out to run, exempts from operation actively fortune to realize convenient operation, information privacy, function use and program and exempt to download to exempt to install Row etc..Its technical solution is as follows:
Scheme includes two class entities, and the first instance of first kind entity i.e. hereinafter is push side, and the second class entity is i.e. hereinafter The and entity is to receive push side, can the program for pushing input and output and running do not push, program can also be pushed After rerun and have to carry out input and output, both of which is the push application in the present invention, the feelings not specialized Under condition, push application includes above-mentioned two situations;Correspondingly, technical solution also there are two types of.In the present invention, push has without asking Seek the meaning with regard to active transmission.
The first scheme is that the program for only pushing input and output and running does not push, and this scheme can only utilize and be pushed end (may be the second equipment, it is also possible to its second system being connected to) uses the related function of input-output equipment and resource, And other software and hardware resources cannot then use: first instance the first system for itself being also possible to first instance to be connected to just With short-distance wireless communication mode and/or the wired of analog signal transmission is not based in all or part of output of the program of operation Communication mode, which is pushed on the output equipment of the second system of its connection through second instance, realizes output, short-distance wireless communication side Formula can for based on Huawei Hlilink, Mesh, ZigBee, WirelessHART, MiWi, Thread, Z-Wave, LiFi, The communication of WiFi, Bluetooth, IrDA, ZigBee, NFC, UWB, DECT or RFID technique are not based on simulation letter Number transmission wired communication mode communication media can be twisted pair, coaxial cable, optical cable or data line, why be not institute Wired communication mode be because digital signal adaptation range it is bigger, can be the various cable network forms of current main-stream, Such as Ethernet, and analog signal is generally used to transmission video, audio, is easy distortion.First instance can be with communication And/or wired communication mode is connected to the first system, here with no restrictions for communication mode, first instance can be first A part of system has the function of push, is exported all or part of the first system by the function that the first system assigns Push out, can also be only the relaying of a push, the first system is first pushed to first instance, and first instance is pushed out again It goes;Second instance can also be connected to the second system with communication and/or wired communication mode, and second instance can be with It is a part of second system, has the function of receiving push, receives the function of assigning after push by second system again second It is exported on the output equipment of system, can also be only the relaying of a push, have the function of that receiving push first receives The push of first instance, is then pushed to second system again.It can also completely or partially export with short-distance wireless communication mode And/or be not based on analog signal transmission wired communication mode be pushed to the portable computer as second instance, tablet computer, Output is realized on the output equipment of mobile terminal or wearable device, is to be pushed directly to second instance here, second instance is just It is final purpose, here in order to avoid offsetting we with prior arts such as the network printer, the projectors that have been carried out now The creativeness of case, therefore second instance is limited to portable computer, tablet computer, mobile terminal and wearable device, simultaneously Also because the current ownership of these equipment is very big, but it is difficult to be shared use, so relevant function should be expanded.The above is For output the case where, below then respectively be for input and simultaneously be directed to input and output the case where, before have been described above explanation Similar situation, following two situation similarly adapts to, is not repeated to illustrate.It is the case where for input, all or part of Input with short-distance wireless communication mode and/or can be not based on the wired communication mode of analog signal transmission and push away through second instance It is sent on the input equipment of the second system of its connection and realizes input, it is logical with short-distance wireless to be also possible to all or part of input Letter mode and/or the wired communication mode for being not based on analog signal transmission are pushed to the portable computer as second instance, put down Input is realized on the input equipment of plate computer, mobile terminal or wearable device.Simultaneously be directed to input and output the case where, all or Part input and output with short-distance wireless communication mode and/or are not based on the wired communication mode of analog signal transmission through the simultaneously Two entities are pushed on the input-output equipment of the second system of its connection simultaneously and realize input and output, are also possible to whole or portion Point input and output with short-distance wireless communication mode and/or are not based on the wired communication mode of analog signal transmission and are pushed to simultaneously It is realized on input-output equipment as the portable computer of second instance, tablet computer, mobile terminal or wearable device defeated Enter output.This programme will input, output pushes out, and allow to support the terminal for receiving push to push away to receive with any other It send, the equipment so as to use oneself convenient to use realizes program in position (in the communication range of permission) convenient to use Input, output, conducive to realize input, output information secrecy.The input and/or output that second instance receives push can be (WINDOWS is similar to by the firmware program (such bare machine just can receive) that runs thereon, the service routine for belonging to operating system System service in system) or be not belonging to the service routine of operating system (service processes of running background are generally required and manually opened It is dynamic) it is automatic received, can also further actively it be sent on input equipment and/or output equipment after the receipt, i.e., defeated Enter and carry out inputting and being exported on an output device in equipment, it is by specified communication that communication aspects, which can further to define, Agreement (being as previously mentioned agreement, Ethernet protocol, ICP/IP protocol of short-distance wireless communication mode etc.) or there are also port into Row is received, i.e., always by specified communication protocol or there are also ports to be ready to receive in monitoring, it is possible to specify one can also As soon as support multi-protocols to need to specify multiple communication protocols more than (such as two, three or more) communication protocol with specified, Also can specify one for the same image protocol also can specify more than one (such as two, three or more) port, Multiport is supported just to need to specify multiple ports.
Second scheme be rerun and have to input using local input output equipment after pushing program it is defeated Out, it with the development of the technologies such as cloud computing, shares and utilizes computing resource (such as CPU, GPU) storage resource (such as memory and other classes Type storage) push products operation may be implemented, but can not achieve the interaction with local, this programme is then to share to utilize this It is also interacted using local input output equipment while ground computing resource storage resource, facilitates operation, information to reach The purpose of secrecy, rather than only resource-sharing;Compared to the first scheme, this programme is pushed out by program or there are also data itself It goes, can use local more resources;Difference with WEB application is that web program (such as webpage) is just obtained after requesting 's;Difference with C/S application is that the client (i.e. C) of C/S application is mounted in advance, and server-side (i.e. S) can only push away Send data to client, although certain data may result in the specific function of client executing.First instance handle is locally stored And/or the first system storage its connection program or with short-distance wireless communication mode and/or be not based on there are also data The wired communication mode of analog signal transmission is pushed to operation on second instance or is pushed to the second of its connection through second instance Operation and the second instance or the second system run the program of above-mentioned push or the data using above-mentioned push in system It at least to use its input equipment carry out input when running the program of above-mentioned push or carry out output or same using its output equipment When using its input and output device carry out input and output.A kind of special situation is exactly in the second instance or described Two system has locally had the program of above-mentioned push or there are also in the case where the copy of data, and the first instance does not push above-mentioned Program or there are also data whole or further clarify only push for retrieve local replica segment and the second instance or The second system directly transfers corresponding local replica operation according to the segment of above-mentioned push and at least to use its input to set It is standby to receive input or carry out output using its output equipment or carry out input and output using its input and output device simultaneously.Push Program can be pushed first there are also data for retrieving the segment of local replica and only in the second instance or described second System just continues to push remaining program when can not retrieve local replica according to the segment of above-mentioned push or there are also data, in this way Save on push cost, efficiency can be greatly improved, especially the program of push or there are also data it is bigger when.The The program of the program or the program or operation push that are pushed using the data run pushed of two entities or second system operation push Local replica or using push data local replica operation push program local replica, which is as operation System operation is run by its operating system or is run by corresponding specialized application software thereon;Second instance It receives the program of push or there are also data can be through the firmware program (such bare machine just can receive) that runs thereon, belongs to behaviour Make the service routine (similar to the system service in WINDOWS system) of system or be not belonging to operating system service routine (after The service processes of platform operation, generally require and manually start) it is automatic received, it after the receipt can also be further actively using it as behaviour Make system operation run by its operating system or by call thereon corresponding specialized application software run, lead to Letter aspect can further to define be by specified communication protocol (be as previously mentioned short-distance wireless communication mode agreement, with Too fidonetFido, ICP/IP protocol etc.) or carry out received there are also port, i.e., exist by specified communication protocol or there are also port always Monitoring is ready to receive, it is possible to specify and one also can specify more than one (such as two, three or more) communication protocol, Support multi-protocols just need to specify multiple communication protocols, for the same image protocol also can specify one also can specify it is super As soon as crossing (such as two, three or more) port, multiport is supported to need to specify multiple ports.
The technical solution that above-mentioned push mode runs program technic can be refined further and perfect:
It is that the communication link established after perceiving second instance between the two is pushed or gone back that first instance, which can be specified, The certification of perception stage is carried out to second instance in perception and only at it by being both foundation in the case where certification Between communication link carry out push or first instance is also needed to second instance and/or the during establishing communication link Two entities also need the certification for carrying out the networking stage to first instance and only all by just establishing communication in the case where certification Link, i.e. first perception resettle communication link (realizing connected network communication) and could push, and carry out in perception to second instance The verifying of perception stage can be based on obtained in perception from second instance entity identification information, digital signature information, Physical network mark/address information and/or the other information that can be used for verifying, for example whether it is verified by entity identification information To authorize the object that can be pushed, the verifying for carrying out perception stage to second instance in perception is also possible to be based on perceiving The encryption information that second instance described in Cheng Zhongcong obtains can be decrypted correctly, be able to carry out retrieval and/or be able to carry out comparison, no It can be decrypted correctly, not can be carried out retrieval and what cannot be compared cannot pass through verifying;During establishing communication link First instance also needs also to need the verifying for carrying out the networking stage to first instance can be second instance and/or second instance to be based on Physical network mark/address information is verified, for example verifies whether it is authorization by physical network mark/address information The object that can be pushed.It to the perception of second instance is perceived by active probe mode that first instance, which can be further clarified, main Dynamic detection, which can be, carries out active spy based on radar, computer vision, other sensors, RFID technique or other network technologies Survey, the step of network protocol generally all include detection especially wireless network protocol, above-mentioned agreement can be based on and be detected, can also It, at this moment can be with direct detection to be to detect (such as video monitoring) based on other technologies, such as radar detection, computer vision Second instance can also detect the other object or person for including or holding second instance;The type of active probe can be wirelessly Electric signal detection is also possible to electric signal detection, such as based on the spy of wired network protocol such as based on the detection of wireless network protocol It surveys;The strategy of active probe can be physical trigger detection (such as pressing entity key), signal triggering detection (such as receives second instance Signal), period active probe, timing active probe and uninterrupted active probe;The function of active probe can be needs It manually or automatically enables, can further clarify and manually or automatically enable to be by application entity button, application entity key, behaviour Make physical switches, operation virtual push button, operation virtual key and/or operates what virtual switch was realized, correspondingly, active probe Function, which can be, to need manually or automatically to close, can further clarify manually or automatically close be by application entity button, What application entity key, application entity switch, operation virtual push button, operation virtual key and/or operation virtual switch were realized;The It is to be contacted/non-connect that one entity, which can be and perceive second instance the or described first instance by autonomous active probe, It just carries out active probe after touching excitation and perceives the second instance.First instance, which can also be, receives second instance/non- The signal that the third entity of first instance and second instance actively issues, signal can also further clarify as specific format/content Signal after perceive, the signal that second instance or third entity actively issue may include entity identification information, physical network Mark/address information, digital signature information establish network linking relevant information, the other information that can be used for verifying, request push Information, specified request push application message and/or other additional informations;The signal packet that second instance or third entity actively issue The information contained completely or partially can be encryption or still can decrypting can also be and can not decrypt, and establish between the two Communication link can be according to based on physical network mark/address information for being obtained in perception from the second instance and/ Or network linking relevant information is established to establish.First instance, which can be, not to carry out active probe but (is such as pressing being contacted Lower entity key) or non-contact (such as by sensor sensing to) excitation after can just receive second instance or third entity actively The signal of sending and perceive second instance and receiving or first instance be to carry out active probe and thus drawing Sending out second instance described actively issues signal and is received by the first instance and perceive the second instance.First is real Body and second instance can have been established in advance communication link between the two and be to receive second in first instance or the first system If the third entity of entity/non-first instance and second instance actively issue it is directly being pushed after request push signal and Two entities actively issue its receive request push signal and carry out push and be not based on same logical communications links (i.e. based on not Same logical communications links, or even use and be different communication protocol), or and be in first instance or the first system end by people It is directly pushed after work or automatic trigger.First instance, which receives signal, to be by the firmware program that runs thereon, belongs to behaviour Make the service routine of system or be not belonging to operating system service routine it is automatic received or to further clarify be by specified One/more than a communication protocol or there are one/be more than a port carry out it is received, referring to the interpretation of front, no It repeats again.It wakes up first instance or also wakes up it simultaneously and carry out pushing/executing other functional requirement second instances or third entity The signal actively issued includes specific content, or further clarifies and can not then not wake up the comprising the specific content One entity also wakes up it simultaneously and carries out pushing/executing other functions;Wake up first instance or also wake up simultaneously its push/ It executes the signal that other functional requirement second instances or the third entity actively issue and uses specific format, or further Clearly carry out pushing/executing other function without can not then wake up first instance using the specific format or also wake up it simultaneously Energy;The signal of specific format its format that second instance or third entity actively issue can be disclosed format or underground Format;Signal its format that second instance or third entity actively issue be first instance cannot distinguish and/it is required then First instance is without push;The function that first instance receives the signal that second instance or the third entity actively issue can be with It is manually or automatically enabled, or further clarifies and manually or automatically enable to be pressed by application entity button, application entity Key, application entity switch, operation virtual push button, operation virtual key and/or operation virtual switch are realized;First instance receives the What the function for the signal that two entities or third entity actively issue can be closed manually or automatically, or further clarify manually or Be automatically closed virtually is pressed by application entity button, application entity key, application entity switch, operation virtual push button, operation What key and/or operation virtual switch were realized.May be required in first instance after establishing communication link must also obtain from second The license of entity/second system is just pushed;It can require whether first instance must also have second instance/second system Have receive push permission carry out verify and by verifying just pushed, first instance to second instance/second system whether It is verifying second instance/second system User ID/user name, number label with the mode that the permission for receiving push is verified Name/digital certificate and/or password/password/authorization code further clarify all or part of need on its input equipment i.e. When input, or further clarify input be by keyboard, mouse, touch screen, the key of non-keyboard key, switch, voice, camera shooting And/or other sensor sensing inputs;Can require second instance/second system also to first instance/the first system whether With to its push permission carry out verify and by verifying just pushed, second instance/second system also to first instance/ The first system whether have the mode verified of permission pushed to it be verifying first instance/the first system User ID/ User name, digital signature/digital certificate and/or password/password/authorization code further clarify all or part of need at it Inputted immediately on input equipment, or further clarify input be by keyboard, mouse, touch screen, non-keyboard key key, open What pass, voice, camera shooting and/or other sensor sensings inputted.Push application (including push input and output and two kinds of push products Second instance or second system situation, similarly hereinafter) in operation can will occupy its input equipment or defeated at any time or on specific opportunity The push application of equipment is closed or is hung up or switches to backstage from front end or from front end is switched to from the background, can clearly pass through out Application entity button, application entity key, application entity switch, operation virtual push button, operation virtual key and/or operation are virtual What switch was realized.It establishes first instance acquisition after communication link and can be from the license of second instance/second system and first carry out Prompt and being obtained in the case where agreeing to push express license or acquisition tacit declaration is permitted in the case where no oppositions push Can, can also further clarify the operation for agreeing to push is realized or leads to by application entity buttons/keys/switch It crosses operation virtual push button/key/switch to realize, or further clarifying the operation for opposing push is to pass through application entity It is that buttons/keys/switch are realized or passing through operation virtual push button/key/switch realizes.Operation is completed in push application Second instance/second system, which can not retain the program being pushed or not retain the data being pushed or not retain any push, answers It uses running trace or does not record push and the program being pushed is exported or only retained using all/part in operation as locally Copy (next time also can be used, i.e., aforementioned, and local here is that second instance/second system is local) only retains quilt The data of push are as local replica or retain whole/part in all received program and data or record push application operation Input or record push export or record whole/partial analysis processing in push application operation using all/part in operation and tie It is local using all/part in operation that fruit or record push the local operation log of whole/part or record push in application operation Data access log.The program of push can be for shell script or to further clarify be autoexec/html file/XML text Part/common text files is also possible to binary program or further clarifies be EXE file/command file/dll file/OCX text Part.The program of push can be application program or be system program or be Virus or be trojan horse program.The program of push is complete Portion or part can be encrypted, digital signature, by verifying and/or by Third Party Authentication.The number of push According to it is all or part of can be abstract having encrypted, being digital signature, comprising all/part push program and/or Abstract comprising all/part push data.The program of push or also data completely or partially can be by symmetrically adding What close algorithm or rivest, shamir, adelman had encrypted;The program of push there are also data is calculated by homomorphic cryptography Method or non-homomorphic encryption algorithm encrypt;The program of push or also data completely or partially can be by verifying, by dividing It analysis and/or is verified using authentication module;The program of push or there are also data completely or partially can be according to third party Certification mark, according to Third Party Authentication certificate and/or being judged whether using Third Party Authentication module through Third Party Authentication.? It receives the program of push or there are also the journeys that the second instance of data or second system only run the above-mentioned push that can be decrypted correctly Sequence, the program for only using the above-mentioned push of the data run that can be decrypted correctly, only operation can pass through the journey of the above-mentioned push of verifying Sequence only uses and can run by the program of the above-mentioned push of data run of the above-mentioned push of verifying and/or only and passed through third party The program of the above-mentioned push of certification.The program of push or the second instance of also data or the second system are received not Run the program for the above-mentioned push that can not be decrypted correctly, without using the journey of the above-mentioned push of the data run that can not be decrypted correctly Sequence, do not run cannot by the program of the above-mentioned push of verifying, without using can not be by the above-mentioned push of data run of verifying Program and/or do not run the program of the above-mentioned push not over Third Party Authentication.First instance can be fixed equipment list Body, semifixed equipment monomer, portable computer, tablet computer, mobile terminal, wearable device or other including having communication With the electronic device of processing capacity or consolidating as the part thereof of fixation at least with communication capacity, half for computer installation Fixed, removable or wearable monomer;Can further clarify first instance be gate input module containing permission partial monosomy, it is other out Entrance access control system partial monosomy containing identity recognizing unit, other entrance access control system consoles, household electrical appliance, lamps and lanterns, trip Gaming machine, navigator, smart home main control device, attendance recorder, cashing machine, POS machine, PIN PAD, ATM, withdrawal All-in-one machine, automatic vending machine, automatic machine, Recharging Machine, automatic ticket checker, self-help inquiry apparatus, self-service printer, aviation Self-service check-in equipment, Multi-functional Self-aided Service Terminal End, other self-service business handling machines, self-service ticketing machine, magnetic stripe card read-write/reading Device, radio frequency read-write/reader, shared bicycle, shared electric vehicle, is shared and is charged in charger baby mode chip card read-write/reader Precious managing device, the shared commodity in other shared economic models, the device that shared commodity are managed in other shared economic models, Car body electronic control device for vehicle, vehicular automotive electronic control device, other device for vehicular electronic, the control of non-motor vehicle It is device, other non-motor vehicle device for vehicular electronic, electronic controller for electromechanic apparatus, other electromechanical equipment electronic devices, big Medium-sized electromechanical equipment console, Console Operated In Medium Or Large Scale Computer Systems, functional mobile phone, smart phone, tablet computer, PDA, notes This computer, smartwatch, intelligent spire lamella, ammeter, water meter, gas meter, flow meter or other electronic equipments for needing to realize non-contact access/ Computer equipment.Second instance can be fixed equipment monomer, semifixed equipment monomer, portable computer, tablet computer, movement Terminal, wearable device or it is other include with communication and processing capacity electronic device or computer installation be used as one The partial fixation at least with communication capacity, semifixed, removable or wearable monomer;Second instance can be further to define For functional mobile phone, smart phone, tablet computer, PDA, laptop, smartwatch or intelligent spire lamella.The first system is to fix Equipment (not necessarily require for monomer, similarly hereinafter), portable computer, tablet computer, mobile terminal, wearable is set semifixed equipment Standby, other electronic device/computer installations or above system with communication and processing capacity can will be used as part thereof of By the part after the first instance separation when first instance is separated;The first system can be further to define to be gate, go out Entrance access control system, household electrical appliance, intelligentized Furniture system, attendance checking system, marketing system, shared economic model background support system It is system, electronic government affairs system, bank counter system, bank payment system, online payment system, automobile, other motor vehicles, non-maneuver Vehicle, electromechanical equipment, self-help ticket-buying/fetching system, self-service ticketing system, SCM system or above system can will be used as it By the part after the first instance separation when first instance of a part is separated.Second system is fixed equipment, partly consolidates Locking equipment, portable computer, tablet computer, mobile terminal, wearable device, other Departments of Electronics with communication and processing capacity By the second instance point when system/computer system or above system can will be separated as part thereof of second instance Part from after;Can further to define second system be mobile intelligent terminal, it is wearable smart machine, tablet computer, portable Computer or above system can be by will be after the second instance separation when separating as part thereof of second instance Part.Third entity can be functional mobile phone, smart phone, tablet computer, PDA, laptop, smartwatch or intelligent wrist Band.The input and output of the program being currently running while being pushed on the input-output equipment of second instance or same through second instance When be pushed to its connection the second system input-output equipment on when, can require at least push an interactive interface into Row visualization shows to facilitate interaction, can further clarify the interactive interface and show at the beginning can limit on an output device Short period in complete show to interact without obviously waiting, the interactive interface can be in the screen as output equipment It can show when locking without unlock, the touch screen lock that the interactive interface can at the same time as input equipment and output equipment It can be inputted when determining without unlock, the interactive interface can open voluntarily so when the screen as output equipment is closed Show afterwards and/or the interactive interface can be in the case where the screen front end as output equipment has other interfaces automatically preceding End shows.Second instance or second system operation push program or using push data run push program and make simultaneously When carrying out input and output with its input and output device, it can require at least to visualize on an output device and show an interaction To facilitate interaction, can further to define that the interactive interface shows at the beginning on an output device can be in the shorter of restriction at interface Complete in time to show to interact without obviously waiting, the interactive interface can be in the screen locking as output equipment When without unlock can show, the interactive interface can at the same time as the touch screen of input equipment and output equipment lock when Time can be inputted without unlock, the interactive interface can open voluntarily and then show when the screen as output equipment is closed And/or the interactive interface can be in the case where the screen front end as output equipment has other interfaces automatically in front end exhibition It is existing.The input and output of the program being currently running while being pushed on the input-output equipment of second instance or same through second instance When be pushed to its connection second system input-output equipment on when, can require that visual interactive interface will not be showed also Can further clarify is by that can lead to after corresponding output equipment playing alert tones, unlatching warning light and/or flash for prompting lamp Cross corresponding input equipment input.The program or pushed using the data run of push that second instance or second system operation push Program or operation push program local replica or using push data local replica operation push program sheet Ground copy and when carrying out input and output using its input and output device simultaneously, can require will not to show visual interaction circle It is by corresponding output equipment playing alert tones that face, which can also further clarify, is opened after warning light and/or flash for prompting lamp i.e. It can be inputted by corresponding input equipment.The output for the program being currently running is pushed on the output equipment of second instance or is passed through The visualization interface that second instance is showed when be pushed on the output equipment of the second system of its connection simultaneously can be with other need The visualization interface to be showed is shared, which to can be used the same screen as output equipment also, can further clarify other need The visualization interface to be showed is other push applications or operation local program, and is further clarified shared using same Only one interface shows in front end or shows in front end but mutually do not block or do not have at least partially when one screen It is blocked.The input for the program being currently running is pushed on the input equipment of second instance or through second instance while being pushed to The same input equipment can be used with other procedure sharings when receiving input on the input equipment of its second system being connected to, may be used also Further clarify it is shared using only one program when the same input equipment currently pass through the input equipment input or Input is currently being carried out by the input equipment but is respectively receiving different input contents.The output for the program being currently running It is pushed on the output equipment of second instance or through second instance while being pushed on the output equipment of second system of its connection When can monopolize using relevant output equipment until terminate or be switched to backstage, hang up or close, can also further it is bright It can really be operated by specific screen sliding, specific keys operate, special sound control operates, is real by video/image acquisition mode Existing specific control operation or any combination thereof realize by front end run program or other push application switchings to from the background, hang-up or It closes.The input for the program being currently running is pushed on the input equipment of second instance or through second instance while being pushed to it It can be monopolized when receiving input on the input equipment of the second system of connection using relevant input equipment until terminating or being cut Backstage is changed to, hangs up or closes, can also further clarify can be by the operation of specific screen sliding, specific keys operation, special sound Control operation, the specific control operation realized by video/image acquisition mode or any combination thereof, which are realized, runs journey for front end Sequence or other push application switchings to backstage, hang-up or are closed.The input and/or output for the program being currently running is pushed to The input for being pushed to the second system of its connection on the input equipment and/or output equipment of two entities or through second instance is set When on standby and/or output equipment, it can not stop or not hang up the second instance or the second system in the program of operation Or further clarify and the program in front end operation is switched to backstage, hang up or close, can also further clarify can pass through The specific control that specific screen sliding operation, specific keys operation, special sound control are operated, realized by video/image acquisition mode Operation or any combination thereof realization is made front end is run program or other push application switchings to backstage, hang-up or is closed.Just On the input equipment and/or output equipment that the input and/or output of the program of operation is pushed to second instance or through second in fact Body can have the local program of operation or other push away when being pushed on the input equipment and/or output equipment of the second system of its connection Send using can also further clarify at this time by front end operation program or other push application switchings to backstage, hang-up or pass Close, and further clarify can by specific screen sliding operate, specific keys operation, special sound control operation, by video/ Specific control operation that Image Acquisition mode is realized or any combination thereof, which is realized, cuts front end operation program or other push application Backstage is changed to, hangs up or closes.The program or pushed using the data run of push that second instance or second system operation push Program or operation push program local replica or using push data local replica operation push program sheet Can have the local program of operation or other push applications that can also further clarify when ground copy at this time will be in the journey of front end operation Sequence or other push application switchings to backstage, hang up or close, and further clarify and can be operated by specific screen sliding, is specific Button operation, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof It realizes and front end is run into program or other push application switchings to backstage, hang-up or is closed.Second instance or the second system It runs the program of push or uses local replica or the use of the program of the data run push of push or the program of operation push The service being able to access that can be used and/or can call when the local replica of the program of the local replica operation push of the data of push It is the function that dynamic link library, control, running environment provide that local program, which can also further clarify the local program that can be called, And/or other functions that running environment provides.The local replica of the program of the push of second instance or the second system preservation or It can be stored in the same memory space for specially marking off and or be stored in not there are also the local replica of the data of push In the same program operation for specially marking off in the memory space come or further clarifying above-mentioned memory space and above-mentioned push The memory space being able to access that is the same memory space or the memory headroom run with it is the same memory space.Second is real The sheet of the program of the program or the program or operation push that use the data run of push to push of body or second system operation push Ground copy or using push data local replica operation push program local replica be one specially mark off come Memory headroom in operation or to further clarify the memory headroom and the memory headroom that uses of local program operation be well-separated 's.What the program that second instance or second system operation push or the program pushed using the data run pushed or operation were pushed The local replica of program or using push data local replica operation push program local replica when be only capable of access deposit It stores up in the number for specially marking off the data of the memory space come, the above-mentioned memory space for being stored in and specially marking off cannot being accessed Data except, be only capable of access by the data of Special Empower and/or cannot access not by the data of Special Empower or Person further can prompt and/or will record access day when accessing the above-mentioned data being able to access that and/or the data that cannot be accessed Will.The push that second instance can receive first instance automatically can be just can be automatic after opening automatic received switch Receiving push or further clarifying the automatic received switch can be turned off manually or must be turned off manually or can be automatic Close or can only be automatically closed must open manually or can only automatically open or can open or automatically open manually or It can be turned off manually or be automatically closed, above-mentioned automatic received switch can be physical switches virtual switch or both There are physical switches to have virtual switch again.
Realize that above-mentioned push mode runs the device of program technic, including at least the driving means and work as first instance For the reception driving means of second instance, or the also push source device as the first system comprising being connected to first instance And/or the push destination apparatus as second system being connected to second instance, it also may include the conduct being connected to first instance The push source device of the first system and the push destination apparatus as second system being connected to second instance, or even can also wrap Containing the sender unit as third entity.Can further to define the driving means be fixed equipment, semifixed equipment, Portable computer, mobile terminal or wearable device, and further clarify reception driving means and be portable computer, move eventually End or wearable device, the details of specific implementation run the technical solution of program technic referring to above-mentioned push mode, repeat no more.
Above-mentioned push mode runs the application method of program technic, technical solution are as follows:
First is that running program technic using above-mentioned push mode, push is showed by the output equipment of second instance or second system The output of application can further clarify output equipment of the above-mentioned output equipment comprising the first instance or the first system not The function (original deficiency can be made up in this way) that has, it is user-friendly (by position flexibly, simplify operation conveniently to make With) and/or conducive to realize output information secrecy (can with oneself equipment and can additional protection measure, can be supervised at nobody The position of control is conducive to secrecy in this way).Second is that running program technic using above-mentioned push mode, pass through the second instance or institute The input equipment for stating second system realizes the input of push application, and can further clarify above-mentioned input equipment includes described first real It is function (original deficiency can be made up in this way) that the input equipment of body or the first system does not have, user-friendly (by position flexibly, simplify operation be easy to use) and/or conducive to realizing that the secrecy of input information (can use oneself equipment And can additional protection measure, can in the position of no worker monitor, in this way be conducive to secrecy).Third is that being run using above-mentioned push mode Program technic is realized by the input-output equipment of the second instance or the second system in the first instance or institute State the use of the program function run on the first system, can further to define above procedure function include the second instance or Function (can make up original deficiency in this way) that the second system does not have includes the second instance or second system System can not can save expense cost by running the function (can make up original deficiency in this way) of program realization, using It (pass through overhead cost realize save) and/or uses the consumption that can be reduced to local resource and (is subtracted by shared resource realization Few consumption).Fourth is that running program technic using above-mentioned push mode, pushed away by the second instance or second system operation The local replica for the program that the program sent or the program for using the data run of push to push or operation push uses push The local replica of the program of the local replica operation push of data realizes above procedure or exempting to download, exempting to install there are also data And/or exempt from operation actively operation (these are all benefits convenient to use), can also further clarify above procedure includes described the Function (can make up original deficiency in this way) that two entities or the second system do not have will not be received by verifying/certification The information for the information of the local original preservation of collection/be originally inputted to be conducive to realize information privacy (this and be all to be conducive to protect below Shield Information Security) and/or by verifying/certification only analyze processing through encryption the original preservation in local information/it is original The information of input is to be conducive to realize information privacy.Fifth is that running program technic using above-mentioned push mode, push can be to described The manipulation of the equipment of the first system or the first instance, the transmission of data access, data mart modeling, data and/or other functions use Application, thus by the second instance or the second system realization the first system or the first instance are set Standby manipulation, data access, data mart modeling, data transmission and/or other functions use, and may be implemented to facilitate operation in this way.Using Above-mentioned push mode runs program technic, push can authentication to the first system or the first instance, authorization and/ Or the application of authentication, to realize the first system or the first instance by the second system or the second instance Authentication, authorization and/or authentication to it in this way first is that facilitating operation to realize, but are conducive to Information Security.Six It is to run program technic using the above-mentioned push mode of right, pushes the second system or the second instance is first system System or the first instance provide the application that its data access, data mart modeling, data transmission and/or other functions use, thus Realize that the second system or the second instance provide its data access, data for the first system or the first instance Processing, data transmission and/or other functions use, and may be implemented to facilitate operation in this way.Seventh is that being run using above-mentioned push mode Program technic pushes instant between the first system or the first instance and the second system or the second instance The application of communication interaction and/or operation collaboration, realizes the first system or the first instance and the second system or institute The instant messaging interaction and/or operation collaboration between second instance are stated, may be implemented to facilitate operation in this way.Above-mentioned technical proposal can In any combination.
Above-mentioned push mode run program technic application method can in practical application further refinement and it is perfect, it is several Kind typical technical solution (and above-mentioned push mode run program technic embodiment) is:
Embodiment 1: by above-mentioned push mode run program technic be applied to shared bicycle, shared automobile, shared electric bicycle, In shared clothes, shared charger baby, shared basketball, shared umbrella or the application of shared massage armchair business model, first instance is upper State shared bicycle, shared automobile or shared electric bicycle or shared clothes, shared charger baby, shared basketball, shared umbrella Or the managing device of shared massage armchair, second instance are smart phone, tablet computer or smartwatch, press the reality of first instance Body button excitation first instance active probe simultaneously perceives the second instance or is put into second instance real close to described first So that first instance is perceived second instance within the scope of the effectively perceive of body, then establishes communication linkage between the two and then first Entity requests the application using sharing articles or further clarifies to be the phase that will be run on first instance to second instance push The input and output of program are answered to be pushed on the input-output equipment of second instance or arrive corresponding program/program and data-pushing It is run on second instance, user can be used corresponding by the interactive interface application that the input-output equipment of second instance shows As the sharing articles of first instance or the sharing articles of first instance management, and is submitting application default while having submitted user Being verified agreement in user information after information, it can be used or also require its corresponding password/password/authorization code/life of input Object feature and agree to after being verified its can be used or and submit application but while after submitting user information do not want also It asks it to input corresponding user information and/or password/password/authorization code/biological characteristic and agrees to that it can make after being verified With or automatic/licensed corresponding user information that reads the user information locally saved or need to also locally be saved in reading And/or password/password/digital certificate/authorization code/biological characteristic and agree to after being verified its can be used or it is automatic/ It is licensed to read the user information locally saved or also read local corresponding hardware attributes information/software setting information simultaneously Agree to that it can be used after being verified, corresponding sharing articles can be used directly in user or it can make in agreement according to it The relevant information that used time provides goes to obtain the use of corresponding sharing articles or further the relevant information is unlocking pin/authorization Code.Using the technical program, using following (it is assumed that relevant equipment is all to realize push mode to run the step of shared bicycle The device of program technic, it is driving means that it is lock that shared bicycle-, which further clarifies, and mobile phone is to receive driving means, communication protocol Using the relevant agreement of NFC technique): certain shared bicycle is used, mobile phone (is passed through toward close put that lock for sharing bicycle The range that NFC can be perceived), its push function is activated, unlock application is pushed on mobile phone by shared bicycle, locking and closing screen The screen of the mobile phone of curtain is turned on and directly runs the unlock of the push in the case where no unlock and applies and enter unlock Then interface, the user information (such as phone number) that local (mobile phone) is read in unlock application require input fingerprint to carry out using awarding Power, after inputting fingerprint authentication success by mobile phone, sharing bicycle auto-unlocking be can be used, can also be as present shared bicycle Using equally show unlocking cipher then with the password lock in person even if.The technical program realize first operation it is convenient, without screen Curtain unlock, starting are applied, into the application existing operating process so cumbersome using interface, and unlock interface is directly entered;Secondly It is applied without installing, and the shared bicycle of different company has different applications, to use the shared bicycle of which company just now Corresponding application must be installed;Third is that the exclusive verification mode of mobile phone can be used, and fingerprint authentication, which is put on shared bicycle, is It is unpractical, and mobile phone can be solved easily, more securely and reliably.If being want in this process using having run on mobile phone Real-time interaction software (assuming that screen has unlocked) can then be operated by left and right screen sliding and be switched over.
Embodiment 2: above-mentioned push mode is run into program technic applied in mobile payment application, first instance is above-mentioned Bank settlement device or its front end portion with communication function in mobile payment application, second instance are smart phone, plate electricity Brain or smartwatch press the entity button excitation first instance active probe of first instance and perceive second instance or by the Two entities are put into makes first instance perceive second instance within the scope of the effectively perceive of first instance, then establishes the two Between communication linkage then application from first instance to second instance push mobile payment or to further clarify be real by first The input and output of the corresponding program run on body are pushed on the input-output equipment of second instance or by corresponding program/programs And run on data-pushing to second instance, user can by the interactive interface that the input-output equipment of second instance shows into Row gathering and/or payment, or further clarify and directly inputting collecting account information or further clarifying collecting account letter Breath is that bank account Receiving information/online payment platform account Receiving information can be completed gathering or directly input payment It account information and/or has submitted corresponding password/password/authorization code/biological characteristic payment authorization information and is being verified Payment can be completed afterwards or read after the collecting account information that locally saves automatic/licensed or need to also read local phase Hardware attributes information/software setting information for answering and after being verified after gathering can be completed or in automatic/licensed reading Take the payment account information locally saved or also need to read corresponding password/password/digital certificate/authorization code for locally saving/ The payment authorizations such as biological characteristic information and after being verified after payment can be completed or in the local guarantor of automatic/licensed readings The payment account information deposited also is needed to read and demonstrate corresponding hardware attributes information/software setting information and is being verified Payment can be completed afterwards or call payment function in local network after interactive interface operation and had input in its payment interface It payment account information and/or has submitted the payment authorizations information such as corresponding password/password/authorization code/biological characteristic and is verifying By rear or without inputting any information payment can be completed.Using the technical program, the step of carrying out mobile payment, is following (false Fixed relevant equipment is all the device for realizing push mode and running program technic, and it is its front end that cashing machine-, which further clarifies, Point it is driving means, mobile phone is to receive driving means, and communication protocol uses the relevant agreement of Bluetooth technology): by mobile phone toward the receipts (range that can be perceived by bluetooth) is nearby put in the front end portion of money machine, activates its push function, and cashing machine will be paid Using being pushed on mobile phone, the screen of the mobile phone of locking and closing screen is turned on and directly runs in the case where no unlock Payment interface is applied and is entered in the payment of the push, payment is completed after inputting bank's card number and payment cipher, to use Payment platform is paid, then selects certain payment platform in payment interface, then calls the local mounted payment platform Application program simultaneously enters payment authorization interface, after inputting fingerprint authorization by mobile phone, that is, completes payment.
Embodiment 3: running program technic for above-mentioned push mode and be applied in electronic safety lock or access control system switch, the One entity is the front end portion of above-mentioned electronic safety lock, access control system or the controllable lockmaking of access control system, and second instance is mobile phone, puts down Plate computer or smartwatch, press first instance entity button excitation first instance active probe and perceive second instance or Second instance is put within the scope of the effectively perceive of first instance or second instance passes through the operation sending of software/hardware thereon Specific format/content signal makes first instance perceive second instance, then establishes communication linkage between the two then the It is the corresponding program that will be run on first instance that one entity pushes the application of lock control or further clarify to second instance Input and output are pushed on the input-output equipment of second instance or by corresponding program/program and data-pushings to second instance Upper operation, the control that user can be locked by the interactive interface that the input-output equipment of second instance shows, and inputting Corresponding password/password/authorization code/biological characteristic and after being verified or also it is required to provide corresponding user information i.e. The control to lock can be achieved.Using the technical program, the step of carrying out non-contact unlocking, is following (it is assumed that relevant equipment is all real The device that push mode runs program technic is showed, it is driving means, mobile phone that it is its control section that access control system-, which further clarifies, It is to receive driving means, communication protocol uses the relevant agreement of WiFi technology): by mobile phone toward near the control section of the cashing machine It puts (range that can be perceived by WIFI) or clicks the specific button of control section, activate its push function, gate inhibition System will unlock using being pushed on mobile phone, and the screen of the mobile phone of locking and closing screen is turned on and the case where not unlocking Unlocking interface is applied and is entered in the unlocking for directly running the push down, after inputting fingerprint authorization by mobile phone, that is, completes to unlock. It is also possible to access control system unlocking interface is pushed on mobile phone, after inputting correct password by mobile phone, that is, completes to unlock.
Embodiment 4: above-mentioned push mode is run into program technic applied to TV, set-top box, sound equipment, refrigerator, air-conditioning, matchmaker The mechanical, electrical rice cooker of body player, heating control, electric oven, electric fan, sweeping robot, camera, electrically driven curtain, air cleaning In the remote control application of device or other household electrical appliance, first instance is above-mentioned TV, set-top box, sound equipment, refrigerator, air-conditioning, media are broadcast Put the mechanical, electrical rice cooker of machine, heating control, electric oven, electric fan, sweeping robot, camera, electrically driven curtain, air purifier or Other household electrical appliance, second instance are mobile phone, tablet computer or smartwatch, press the entity button excitation first of first instance Entity active probe simultaneously perceives second instance or is put into second instance within the scope of the effectively perceive close to first instance or the Two entities, which operate sending specific format/content signal by software/hardware thereon, makes first instance perceive second instance, so Establishing communication linkage between the two afterwards, then first instance is to second instance push household appliance remote control application or further Clearly be the corresponding program that will be run on first instance input and output be pushed on the input-output equipment of second instance or It will be run on corresponding program/program and data-pushing to second instance, user can pass through the input-output equipment of second instance The interactive interface showed realizes the remote control to household electrical appliance, or further clarifies and need to input user information before being remotely controlled Or it is also required to input corresponding password/password/authorization code/biological characteristic and after being verified or automatic/licensed The corresponding user information and/or password/password/number that reads the user information locally saved or need to also locally be saved in reading Certificate/authorization code/biological characteristic and after being verified or in automatic/licensed user information that locally saves or also of reading Local corresponding hardware attributes information/software setting information need to read and can be just remotely controlled after being verified.Using this Technical solution, the step of carrying out non-contact unlocking, are following (it is assumed that relevant equipment is all to realize push mode to run program side The device of method, household electrical appliances are driving means, and mobile phone is to receive driving means, and communication protocol uses the relevant agreement of WiFi technology): it will Mobile phone nearby puts (range that can be perceived by WIFI) toward the television set to be controlled, and activates its push function while also swashing Remote control interface is all pushed on mobile phone by the push function of other household electrical appliances, these household electrical appliances near having lived, and respective interface has distinguishable The a part recognized is not blocked, and the remote control interface of television set is selected to carry out operation control.
Embodiment 5: by above-mentioned push mode run program technic applied to ATM machine, the number of taking machine, ticket taking machine, booking machine, fill Check-in or other self-service business handling machines non-contact in use, first instance be above-mentioned ATM machine, self-help inquiry apparatus, the number of taking machine, Ticket taking machine, booking machine, top-up machines or other self-service business handling machines, second instance are mobile phone, tablet computer or smartwatch, are pressed The entity button excitation first instance active probe of lower first instance simultaneously perceives second instance or is put into second instance close Within the scope of the effectively perceive of first instance or second instance passes through the operation sending specific format/content letter of software/hardware thereon Number first instance is made to perceive second instance, then first instance pushes away the communication linkage for then establishing between the two to second instance Sending the Touchless manipulation of self-service business handling machine to apply or further clarify is the corresponding program that will be run on first instance Input and output are pushed on the input-output equipment of second instance or by corresponding program/program and data-pushings to second instance Upper operation, user can be realized by the interactive interface that the input-output equipment of second instance shows to above-mentioned self-service business handling The Touchless manipulation of machine, or further clarify and need to input user information before being remotely controlled or also require its input corresponding Password/password/authorization code/biological characteristic and the user's letter locally saved after being verified or in automatic/licensed reading Breath need to also read the corresponding user information locally saved and/or password/password/digital certificate/authorization code/biological characteristic And after being verified or it is automatic/licensed read the user information that locally saves or need to also read it is local corresponding hard Part attribute information/software setting information simultaneously just can be carried out Touchless manipulation after being verified.Using the technical program, carry out non- The step of contacting self-service query is following (it is assumed that relevant equipment is all the device for realizing push mode and running program technic, to scheme The self-service query retrieval machine in book shop is driving means, and mobile phone is to receive driving means, and communication protocol is relevant using WiFi technology Agreement): mobile phone is nearby put into once (range that can be perceived by WIFI) toward self-service query retrieval machine, it is activated to push function Can, the self-service query retrieve machine query and search interface is pushed on mobile phone (different mobile phones correspond to different query and searches into Journey carries out different inquiries), locking and close screen mobile phone screen be turned on and in the case where no unlock directly Query and search interface is applied and entered to the query and search for running the push, inputs keyword by mobile phone, can be inquired It retrieves and shows result in mobile phone.
Embodiment 6: above-mentioned push mode is run into program technic and is applied to closely using in the application of function, first is real Body is that entity is desktop computer, portable computer, mobile phone, tablet computer or smartwatch, and second instance is mobile phone, plate Computer or smartwatch press the entity button excitation first instance active probe of first instance and perceive second instance or incite somebody to action Second instance is put within the scope of the effectively perceive of first instance or second instance is special by the operation sending of software/hardware thereon The formula of fixing/content signal makes first instance perceive second in fact with specific data line connection first instance and second instance Body, then establish communication linkage between the two then first instance to second instance push closely using the application of function or It is that the input and output of the corresponding program that will be run on first instance are pushed to the input and output of second instance and set that person, which further clarifies, Standby upper or will run on corresponding program/program and data-pushing to second instance, user can pass through the input of second instance The interactive interface that output equipment shows is realized to use to the short distance of first instance function or further clarify above-mentioned function The function and/or be the function that its peripheral hardware has that first instance host itself has, or further clarify and carrying out closely It needs to input user information before use or it is also required to input corresponding password/password/authorization code/biological characteristic and lead in verifying Later believe or in automatic/licensed corresponding user that reads the user information locally saved or need to also locally be saved in reading Breath and/or password/password/digital certificate/authorization code/biological characteristic and after being verified or in automatic/licensed reading The user information that locally saves need to also read local corresponding hardware attributes information/software setting information and be verified It just can be carried out and closely use afterwards.Using the technical program, carry out the step of near radio uses printing function it is following (it is assumed that Relevant equipment is all the device for realizing push mode and running program technic, and the desktop computer for being connected with printer is driving means, Tablet computer is to receive driving means, and communication protocol uses the relevant agreement of WiFi technology): by tablet computer toward wanting desktop computer attached (range that can be perceived by WIFI) closely is put, activates it to export push function, by the shared application using printing function It is pushed on tablet computer, tablet computer runs the application of the push and enters the shared interface using printing function, passes through On input selection tablet computer after the document to be printed, document can be transmitted in the past and complete to print.
Embodiment 7: above-mentioned push mode is run into program technic and is applied in the closely application of reading, first instance is Entity be the ammeter of electronization, water meter, gas meter, flow meter, other inconvenient meter readings gauge table or other sensor reading devices, second Entity is mobile phone, tablet computer or smartwatch, presses the entity button excitation first instance active probe of first instance and feels Know second instance or by second instance be put within the scope of the effectively perceive close to first instance or second instance pass through it is soft thereon Part/hardware operation, which issues specific format/content signal, makes first instance perceive second instance, then establishes between the two It is by first instance that communication linkage and then first instance push the closely application of reading or further clarify to second instance The input and output of the corresponding program of upper operation be pushed on the input-output equipment of second instance or by corresponding program/program and It is run on data-pushing to second instance, user can be realized by the interactive interface that the input-output equipment of second instance shows To the short distance reading of first instance, or further clarifies and need to input user information before carrying out short distance use or also want It is asked to input corresponding password/password/authorization code/biological characteristic and after being verified or in automatic/licensed reading sheet User information that ground saves or need to also read the corresponding user information that locally saves and/or password/password/digital certificate/ Authorization code/biological characteristic simultaneously reads the user information that locally saves or need to also be after being verified or automatic/licensed It reads local corresponding hardware attributes information/software setting information and just can be carried out after being verified and closely read.Using The technical program, the step of carrying out non-contact meter reading, are following (it is assumed that relevant equipment is all to realize push mode to run program The device of method, water meter indoors are driving means, and mobile phone is to receive driving means, and communication protocol is related using WiFi technology Agreement): mobile phone is put into once (range that can be perceived by WIFI) toward the outdoor near the water meter for wanting meter reading, activates its defeated Push function out will count interface and be pushed on mobile phone, meter reading can be completed.
It can be refined in from the above and locate a kind of method for protecting information security, technical solution is:
Scheme can also run the application side of program technic first is that running program technic from above-mentioned push mode from above-mentioned push mode All or part of input in method is the input equipment by second instance or second system rather than first instance or the first system The input equipment of itself carries out input to which all or part of input for being conducive to realize that the secrecy of input information extracts is to pass through From it is being separated with itself or it is another inputted in additional input terminal itself, it is previously mentioned can use position flexibly and take attached The safeguard procedures added to protect information security, can also further expand require the input terminal be it is believable, in general oneself Equipment mobile phone be exactly it is believable, more conducively protection input message safety.Scheme is second is that run program technic from above-mentioned push mode It can also be by passing through second instance from all or part of output in the application method that above-mentioned push mode runs program technic Or second system input equipment rather than the output equipment of first instance or the first system itself carry out output to be conducive to realize All or part of output that the secrecy of output information extracts be from it is being separated with itself or it is another additional output end itself into Row output, it is previously mentioned to can use position flexibly and take additional safeguard procedures to protect information security, it can also be further Expand the output end be it is believable, in general the equipment mobile phone of oneself is exactly believable, more conducively protection output information safety. Scheme third is that run program technic from above-mentioned push mode can also be from the application method that above-mentioned push mode runs program technic The program of push to be by the program of verifying extracted be passes through verifying and combine that expands can confirm this by verifying Program can protect information security, and can confirm that the program can protect information security by verifying is to protect information security one very Good measure cannot can consider that at least there are security risks, cannot run by this verifying;It can also be further Can clearly confirm authorized will not access the information locally saved, licensed will not pass the local guarantor that can be decrypted correctly back The information deposited, the information that licensed will not pass the local input that can be decrypted correctly back, will not licensed preservation can be just The information for the local input really decrypted only passes the information locally saved that cannot be decrypted correctly back, only passes back and cannot be decrypted correctly Local input information, only save the information locally saved that cannot be decrypted correctly and/or only save and cannot be decrypted correctly The information of local input, above-mentioned measure protect the safety of information from different perspectives.Scheme from above-mentioned push mode fourth is that run Program technic from the program of the push in the application method that above-mentioned push mode runs program technic is recognized by third party The program of card extracted is to pass through Third Party Authentication and combine can confirming by Third Party Authentication for expansion that can protect letter Breath safety, can confirm that the program can protect information security by Third Party Authentication is that protection information security one is arranged well It applies, cannot can consider that at least there are security risks, cannot run by this Third Party Authentication;It can also be further Can clearly confirm authorized will not access the information locally saved, licensed will not pass the local guarantor that can be decrypted correctly back The information deposited, the information that licensed will not pass the local input that can be decrypted correctly back, will not licensed preservation can be just The information for the local input really decrypted only passes the information locally saved that cannot be decrypted correctly back, only passes back and cannot be decrypted correctly Local input information, only save the information locally saved that cannot be decrypted correctly and/or only save and cannot be decrypted correctly The information of local input, above-mentioned measure protect the safety of information from different perspectives.Above scheme can be in any combination.
The method of above-mentioned protection information security can be refined further and perfect, and technical solution is arranged using following technology It one of applies or any combination:
1, the information locally saved that cannot be decrypted correctly passed back or saved is still may be used using homomorphic encryption algorithm encryption It, the advantages of this is homomorphic encryption algorithm, can be in the case of non-decrypting to be analyzed and processed in the case of non-decrypting It is analyzed and processed, similarly hereinafter;2, the information for the local input that cannot be decrypted correctly passed back or saved is calculated using homomorphic cryptography Method encryption still can be analyzed and processed in the case of non-decrypting;3, by user authentication when carrying out user authentication Relevant information is pushed to or is pushed to after encrypting input terminal to carry out user authentication in input terminal, and user authentication is all on backstage at present It carries out, input user authentication relevant information in front end all passes backstage back and carries out user authentication, and this technology measure is then gone around The relevant information of user authentication for being stored in backstage is pushed to front end and carries out user authentication by it, and this technology measure can be used as one A independent claim proposes that the method and measure that may also be combined with other protection information securities of the invention carry out into one it It walks perfect, can arbitrarily select one, can also be the methods of the other protection information securities of selection and any combination of measure.It can also be into The clear user authentication relevant information of one step is the letter that the user authentication in addition to the other equivalent informations of user name/user name needs Breath, digital signature, digital certificate, password, password or authorization code, because back-end data is pushed to front end and generally requires as far as possible It is few, it otherwise will cause the dangerous of the data of these push again, therefore, some numbers can only be selectively chosen from back-end data According to according to the other equivalent informations of user name/user name for exactly inputting and extracting, (can be hardware attributes, IP address etc. can To substitute the information of user name), the information of the above-mentioned user authentication needs in addition to the other equivalent informations of user name/user name, Digital signature, digital certificate, password, password or authorization code can be according to the other equivalent information retrievals of the user name/user name Input terminal is pushed to after out again;4, by the information and/or local with local input when carrying out information analysis processing The information that the information of preservation is analyzed and processed together is pushed to or is pushed to after encrypting input terminal to be analyzed in input terminal Processing, this is the 3rd expansion, is extended to front-end information analysis processing from front end user certification, can also serve as one solely Vertical claim proposes that the method and measure that may also be combined with other protection information securities of the invention carry out it further complete It is kind, one can be arbitrarily selected, can also be the method for the other protection information securities of selection and any combination of measure;5, it is being used Family will be pushed to or one when certification together with the information of user authentication relevant information and local input related with user authentication Third party is pushed to after same encryption to carry out user authentication or further clarify user authentication relevant information to be to remove in third party Information, the digital signature, digital certificate, password, password that user authentication except the other equivalent informations of user name/user name needs Or information, the number that authorization code or the above-mentioned user authentication in addition to the other equivalent informations of user name/user name need are signed Name, digital certificate, password, password or authorization code are pushed away again after being retrieved according to the other equivalent informations of user name/user name It is sent to input terminal;This is the 3rd mutation, becomes carrying out user authentication to third party from front end user certification;It equally can be with Itd is proposed as an independent claim, may also be combined with other protection information securities of the invention method and measure to its into Row is further perfect, can arbitrarily select one, can also be the method for the other protection information securities of selection and any combination of measure; 6, it is saved when carrying out information analysis processing by the information for needing the information for analyzing processing and local input and/or locally Information is pushed to or is pushed to after encrypting together third party together to be analyzed and processed in third party;This is the 4th mutation, Become to third party carrying out the analysis processing of information from front-end information analysis processing;It can also serve as an independent right to want It is proposed is asked, the method and measure that may also be combined with other protection information securities of the invention carry out further perfect, Ke Yiren to it Meaning selects one, can also be the method for the other protection information securities of selection and any combination of measure;7, above-mentioned to be decrypted correctly Local input information be only applicable to personal information and/or individual privacy information or further clarify above- mentioned information be structure Change information and/or unstructured information, personal information, individual privacy information needs are laid special stress on protecting, similarly hereinafter;8, above-mentioned cannot The information locally saved being decrypted correctly is only applicable to personal information and/or individual privacy information or further clarifies above-mentioned letter Breath is structured message and/or unstructured information.
The application method of the method for above-mentioned protection information security, technical solution (also can be used as embodiment) have following several Kind:
Embodiment 1: by the approach application of above-mentioned protection information security to B/S mode or the software systems of C/S model, with The software section of family end operation is allowed for authorized not accessing by verifying or Third Party Authentication confirmation and locally be saved Information licensed will not pass the information locally saved that can be decrypted correctly back, licensed will not pass back and can correctly solve The information of close local input, will not the local input that can be decrypted correctly of licensed preservation information, only pass back cannot be just The information locally saved really decrypted, the information for only passing the local input that cannot be decrypted correctly back are only saved and cannot be decrypted correctly The information locally saved and/or only save the information of local input that cannot be decrypted correctly.Using the technical program, letter is carried out Ceasing safeguard protection, the specific method is as follows, and the internet hunt of search engine companies degree applies collection user information under a cloud, Therefore certain degree, which needs its internet hunt to need to access web page program using user, transfers to Third Party Authentication confirmation not collect User information can just leave no doubt as to really without collecting user information.
Embodiment 2: by the approach application of above-mentioned protection information security to B/S mode or the software systems of C/S model, User authentication is to complete or further clarify the user name or other equivalences for being backstage according to user terminal input in user terminal Information from retrieved in background user authentication information be pushed to after relevant authentication information is pushed to or encrypts user terminal again with Completion compared with other information related with user authentication of family end input carry out analysis.Using the technical program, information is carried out The specific method is as follows for safeguard protection, the software systems of certain C/S model, and client-side program inputs username and password in user Afterwards, serve end program retrieves corresponding password according to the user name, and the password for being pushed to client and user's input compares It is right, it is consistent, pass through certification.
Embodiment 3: by the approach application of above-mentioned protection information security to B/S mode or the software systems of C/S model, User authentication is to complete or further clarify the user name or other equivalences for being backstage according to user terminal input in third party Information retrieved from background user authentication information relevant authentication information and user terminal input it is other related with user authentication Information be pushed to or be pushed to after encrypting together together third party carry out again analysis compare completion.Using the technical program, Carrying out information safety protection, the specific method is as follows, and the software systems of certain C/S model, client-side program inputs user in user After name and password, serve end program is pushed to together according to the password that the user name retrieves corresponding password and user's input Third party is compared, and third party's comparison is consistent, passes through certification.
Embodiment 4: by the approach application of above-mentioned protection information security to B/S mode or the software systems of C/S model, Information collection is to complete in user terminal and wherein collected personal information and/or individual privacy information are encrypting storings the Tripartite, need using when file a request to the third party corresponding processing be decrypted by third party and executed to corresponding information Or the non-decrypting processing directly executed, or further clarifying is that will be supplied to judicial apparatus after the video image information specified decryption Pass will press the specified E-mail address information transmission mail wherein saved in plain text, will wherein be specified with what homomorphic encryption algorithm encrypted Information directly carries out calculation process simultaneously feedback result or the telephone number information solution that will wherein specify in the case of non-decrypting Short message is sent after close.Using the technical program, carrying out information safety protection, the specific method is as follows, the software system of certain C/S model System, the personal information such as name, ID card No., cell-phone number, the home address of client-side program acquisition are stored to third party It will be in someone ID and short message when serve end program will use someone cell-phone number transmission short message without being stored in server-side Appearance issues third party, and third party retrieves according to the ID and short message content is sent to its cell-phone number after the cell-phone number of the people, if Third party is believable, then information security is exactly secure.
It can also be run from above-mentioned push mode and extract a kind of signal specific recognition in the specific condition of program technic RFID approach, technical solution are:
Above-mentioned push mode is run into wake-up first instance in program technic or also wake up simultaneously its push/execute it is other The signal that functional requirement second instance or third entity actively issue includes specific content and/or uses in specific format First instance is clearly that signal is received based on RFID technique, is thus extracted by the inclusion of specific content and/or use The signal of specific format realizes recognition to RFID to wake up RFID, can also further clarify not comprising specific content And/or using the specific format, then the signal can not wake up recognition of the RFID realization to the RFID, and also require special Fixed content should be different in the foremost portion of whole signals and/or the frequency range of the frequency range and RFID feedback that issue signal. Above scheme can also be refined further, which includes that can be directly used for determining the data of time, can be directly used for determining position Data and/or can be directly used for execute instruction or further clarify the RFID be by association clock can be direct to obtain Determine the data of time, the RFID be by coordinate interrelation module with obtain can be directly used for determine position data and/ Or the RFID is by associated instructions generator or command memory to obtain the instruction that can be directly used for executing.Current RFID tag, as long as corresponding reader can read the content of RFID tag, by this method, corresponding reader is also Signal specific can be issued by, which needing, could read the content of RFID tag, otherwise can not wake up RFID and feed back its content, thus may be used To realize that the content of RFID tag cannot be distinguished arbitrarily, to protect its information security.
Above-mentioned signal specific recognition RFID approach can extract a kind of RFID comprising specific data, technical solution It is:
RFID includes that can be directly used for determining the data of time, can be directly used for determining the data of position and/or can be directly used for The instruction of execution;It is by association clock to obtain the data that can directly determine the time that RFID, which can also be further clarified, and Further clarify RFID be by coordinate interrelation module with obtain can be directly used for determine position data, and further it is bright True RFID is by associated instructions generator or command memory to obtain the instruction that can be directly used for executing.
The application method of the above-mentioned RFID comprising specific data, technical solution is:
The RFID of data in the above-mentioned RFID comprising specific data comprising can be directly used for determining the time is used as time tag, The time tag being used as can also be further clarified;Or it will be true comprising can be directly used in the above-mentioned RFID comprising specific data The RFID for positioning the data set is used as location tags, can also further clarify the location tags being used as;Or include by above-mentioned RFID comprising the instruction that can be directly used for executing in the RFID of specific data is used as instruction label, and can also further clarify is to use The instruction label of work.

Claims (10)

1. a kind of push mode runs program technic, it is characterised in that:
The all or part of output for the program that first instance is currently running the first system of itself and/or its connection is with short distance Communication and/or the wired communication mode for being not based on analog signal transmission are pushed to the second of its connection through second instance Realize that output, or all or part of output with short-distance wireless communication mode and/or are not based on mould on the output equipment of system The wired communication mode of quasi- signal transmission is pushed to the portable computer as second instance, tablet computer, mobile terminal or can Realize output, or all or part of input with short-distance wireless communication mode and/or non-base on the output equipment of wearable device It is realized on the input equipment that the wired communication mode of analog signal transmission is pushed to the second system that it is connected to through second instance Input, or all or part of wire communication for inputting with short-distance wireless communication mode and/or being not based on analog signal transmission Mode is pushed on the input equipment of the portable computer as second instance, tablet computer, mobile terminal or wearable device Realize that input, or all or part of input and output with short-distance wireless communication mode and/or are not based on analog signal biography simultaneously Defeated wired communication mode is pushed on the input-output equipment of the second system of its connection simultaneously through second instance and realizes input Output, or all or part of input and output with short-distance wireless communication mode and/or are not based on analog signal transmission simultaneously Wired communication mode is pushed to the defeated of the portable computer as second instance, tablet computer, mobile terminal or wearable device Enter and realizes input and output on output equipment;
Or
First instance it is being locally stored and/or its connection the first system storage program or there are also data with short distance without Line communication mode and/or the wired communication mode for being not based on analog signal transmission are pushed to operation or real through second on second instance Body is pushed to the program that operation and the second instance or the second system on the second system of its connection run above-mentioned push Using the above-mentioned push of data run of above-mentioned push program when at least will use its input equipment carry out input or using its Output equipment carries out output or carries out input and output using its input and output device simultaneously, or in the second instance or institute The first instance in the case that second system has locally had the program of above-mentioned push or the copy of also data is stated not push Above procedure or there are also the whole of data or to further clarify only push described second real for retrieving the segment of local replica Body or the second system directly transfer corresponding local replica operation according to the segment of above-mentioned push and at least to use its defeated Enter equipment to receive input or carry out output using its output equipment or carry out input and output using its input and output device simultaneously.
2. push mode according to claim 1 runs program technic, it is characterised in that:
The first instance is that the communication link established after perceiving the second instance between the two is pushed or gone back The certification of perception stage is carried out to the second instance in perception and is only established in the case where it is by certification Communication link between the two carries out push or the first instance is also needed to described the during establishing communication link Two entities and/or the second instance also need the certification for carrying out the networking stage to the first instance and only all by recognizing Communication link is just established in the case where card, or further clarifying the first instance is to pass through to the perception of the second instance It is that active probe mode perceives and/or receive the second instance/non-first instance and second instance third The signal or further clarify to perceive after specific format/content signal that entity actively issues;Or both between in advance Communication link has been established and is to receive the second instance/non-described first in fact in the first instance or the first system If the third entity of body and the second instance actively issues directly being pushed after request push signal and described second Entity actively issue its receive request push signal and carry out push and be not based on same logical communications links, or and be What the first instance or the first system end were directly pushed after manual or automatic triggering;
Simultaneously/or after establishing communication link the first instance also needs to obtain from the second instance/second system License is just pushed, whether the first instance there is the permission for receiving and pushing to carry out to the second instance/second system Verifying and by verifying just carry out push and/or the second instance/second system be also to the first instance/the first system It is no that there is the permission pushed to it verify and just be pushed by verifying;
Simultaneously/or the push application second instance in operation or the second system can at any time or will on specific opportunity The push application for occupying its input equipment or output equipment is closed or is hung up or switches to backstage from front end or from switching to from the background Front end;
Simultaneously/or push application the second instance/second system of operation is completed and does not retain the program being pushed or not Retain the data being pushed or does not retain any push running trace of application or do not record whole/portion in push application operation Divide output or only retains the program being pushed as local replica or only retain the data being pushed as local replica or reservation All received program and data or record push are inputted or are recorded using all/part in operation and is complete in push application operation Whole in whole/partial analysis processing result or record push application operation in the output of portion/part or record push application operation/ Whole/part local data access log in part local operation log or record push application operation;
Simultaneously/or the program of push be shell script or to further clarify be autoexec/html file/XML file/general Leading to text file either binary program or further clarifying is EXE file/command file/dll file/OCX file;
Simultaneously/or the program of push be application program or be system program or be Virus or be trojan horse program;
Simultaneously/or push program be completely or partially encrypted, digital signature, it is by verifying and/or pass through Third Party Authentication;
Simultaneously/or push products or first pushed there are also data for retrieve the segment of local replica and only described second it is real Body or the second system just continue to push remaining when can not retrieve local replica according to the segment of above-mentioned push;
Simultaneously/or push data be completely or partially encrypted, be digital signature, comprising all/part push Program abstract and/or comprising all/part push data abstract;
Simultaneously/or received the program of push or only run can there are also the second instance of data or the second system The program for the above-mentioned push being decrypted correctly, the program for only using the above-mentioned push of the data run that can be decrypted correctly, only operation energy By the program of the above-mentioned push of verifying, only use can by verifying above-mentioned push the above-mentioned push of data run program And/or only run the program for having passed through the above-mentioned push of Third Party Authentication;
Simultaneously/or received the program of push or do not run cannot there are also the second instance of data or the second system The program for the above-mentioned push being enough decrypted correctly, without using the above-mentioned push of the data run that can not be decrypted correctly program, do not transport Row cannot by the program of the above-mentioned push of verifying, without using the program of the above-mentioned push of data run of verifying can not be passed through And/or do not run the program of the above-mentioned push not over Third Party Authentication;
Simultaneously/or the first instance be fixed equipment monomer, semifixed equipment monomer, portable computer, tablet computer, shifting Dynamic terminal, wearable device or it is other include electronic device or computer installation with communication and processing capacity conduct its The fixation at least with communication capacity of a part, semifixed, removable or wearable monomer;
Simultaneously/or the second instance be fixed equipment monomer, semifixed equipment monomer, portable computer, tablet computer, shifting Dynamic terminal, wearable device or it is other include electronic device or computer installation with communication and processing capacity conduct its The fixation at least with communication capacity of a part, semifixed, removable or wearable monomer;
Simultaneously/or the first system be fixed equipment, semifixed equipment, portable computer, tablet computer, mobile terminal, Wearable device, other electronic device/computer installations or above system with communication and processing capacity can will be used as it By the part after the first instance separation when first instance of a part is separated;
Simultaneously/or the second system be fixed equipment, semifixed equipment, portable computer, tablet computer, mobile terminal, Wearable device, other electronic system/computer systems or above system with communication and processing capacity can will be used as it By the part after the second instance separation when second instance of a part is separated;
Simultaneously/or the input and output of the program being currently running while being pushed on the input-output equipment of the second instance Or when be pushed to simultaneously on the input-output equipment for the second system that it is connected to through the second instance, at least push one Interactive interface carries out visualization and shows, or further clarifies the interactive interface and show at the beginning can limit on an output device Complete to show to interact without obviously waiting in fixed short period, the interactive interface can be in the screen as output equipment It can show when curtain locking without unlock, the touch screen that the interactive interface can at the same time as input equipment and output equipment It can be inputted when locking without unlock, the interactive interface can open voluntarily when the screen as output equipment is closed Then show and/or the interactive interface can exist automatically in the case where the screen front end as output equipment has other interfaces Front end shows;
Simultaneously/or the second instance or the second system operation push program or using push data run push Program and simultaneously using its input and output device carry out input and output when, at least to visualize on an output device and show one A interactive interface, or further clarifying that the interactive interface shows at the beginning on an output device can be in the short period of restriction It is interior completion show to interact without obviously waiting, the interactive interface can be when as the screen locking of output equipment Without unlock can show, the interactive interface can at the same time as the touch screen of input equipment and output equipment lock when without Need to unlock can input, the interactive interface can as output equipment screen close when open voluntarily then show and/ Or the interactive interface can show in front end automatically in the case where the screen front end as output equipment has other interfaces;
Simultaneously/or the input and output of the program being currently running while being pushed on the input-output equipment of the second instance Or when being pushed to simultaneously through the second instance on the input-output equipment for the second system that it is connected to, it will not show visual The interactive interface of change or to further clarify be by corresponding output equipment playing alert tones, opens warning light and/or flashing It can be inputted by corresponding input equipment after warning light;
Simultaneously/or the second instance or the second system operation push program or using push data run push Program or operation push program local replica or using push data local replica operation push program sheet Ground copy and simultaneously using its input and output device carry out input and output when, will not show visual interactive interface or into One step is clearly by that can pass through phase after corresponding output equipment playing alert tones, unlatching warning light and/or flash for prompting lamp The input equipment input answered;
Simultaneously/or the second instance or the second system operation push program or using push data run push Program or operation push program local replica or using push data local replica operation push program sheet Ground copy, the program are to be run as operating system by its operating system or corresponding thereon by calling Specialized application software is run;
Simultaneously/or the second instance receive the program of push or be by the firmware program that runs thereon there are also data, belong to In operating system service routine or be not belonging to operating system service routine is automatic received or also active handle after the receipt It is run by its operating system as operating system or by calling corresponding specialized application software thereon Run, or further clarifying is by specified one/more than communication protocol or there are one/be more than a port into Row is received;
Simultaneously/or the second instance receive the input and/or output of push and be by the firmware program that runs thereon, belong to The service routine of the operating system or service routine for being not belonging to operating system is automatic received or also active transmission after the receipt Onto input equipment and/or output equipment, or further clarify be by specified one/more than a communication protocol or also One/it is more than that a port progress is received;
Simultaneously/or the first instance receive signal and be by the firmware program that runs thereon, belong to the service of operating system Program or the service routine for being not belonging to operating system it is automatic received or further clarify be by specified one/more than one Communication protocol or there are one/be more than a port carry out it is received;
Simultaneously/or the output for the program being currently running is pushed on the output equipment of the second instance or through described second The visualization interface that entity is showed when be pushed on the output equipment of the second system of its connection simultaneously can be with other need The visualization interface to be showed is shared to be used the same screen as output equipment or further clarifies this and other need to open up Existing visualization interface is other push applications or operation local program, or is further clarified shared using same When screen only one interface show in front end or front end show but mutually do not block or at least part do not hidden Gear;
Simultaneously/or the input for the program being currently running is pushed on the input equipment of the second instance or through described second Entity is pushed on the input equipment of the second system of its connection when receiving input simultaneously and can use with other procedure sharings The same input equipment, or further clarify and share using only one program when the same input equipment current by being somebody's turn to do Input equipment carries out input or is currently carrying out input by the input equipment but respectively receiving different input contents;
Simultaneously/or the output for the program being currently running is pushed on the output equipment of the second instance or through described second It is exclusive when entity is pushed to simultaneously on the output equipment of the second system of its connection to use relevant output equipment until knot Beam is perhaps switched to backstage, hangs up or close or further clarify and can be grasped by the operation of specific screen sliding, specific keys Make, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof is realized will Front end runs program or other push application switchings to backstage, hang-up or closes;
Simultaneously/or the input for the program being currently running is pushed on the input equipment of the second instance or through described second Entity is pushed on the input equipment of the second system of its connection to monopolize when receiving input simultaneously and be set using relevant input It is standby until terminate or be switched to backstage, hang up or close, or further clarify can be operated by specific screen sliding, it is specific by It is real that key operation, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof Front end is now run into program or other push application switchings to backstage, hang-up or is closed;
Simultaneously/or the input and/or output for the program being currently running be pushed to the second instance input equipment and/or It is pushed on output equipment or through the second instance on the input equipment and/or output equipment of the second system of its connection When, do not stop or do not hang up the second instance or the second system in the program of operation or further clarify will be in front end The program of operation is switched to backstage, hangs up or close, or further clarifies and can be grasped by the operation of specific screen sliding, specific keys Make, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof is realized will Front end runs program or other push application switchings to backstage, hang-up or closes;
Simultaneously/or the input and/or output for the program being currently running be pushed to the second instance input equipment and/or It is pushed on output equipment or through the second instance on the input equipment and/or output equipment of the second system of its connection Shi Keyou operation local program or it is other push application or further clarify at this time by front end operation program or its It pushes application switching to backstage, hang-up or closes, or further clarifies and can be grasped by the operation of specific screen sliding, specific keys Make, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof is realized will Front end runs program or other push application switchings to backstage, hang-up or closes;
Simultaneously/or the second instance or the second system operation push program or using push data run push Program or operation push program local replica or using push data local replica operation push program sheet Can have the local program of operation or other push to apply or further clarify when ground copy at this time will be in the journey of front end operation Sequence or other push application switchings to backstage, hang up or close, or further clarify and can be operated by specific screen sliding, is specific Button operation, special sound control operation, the specific control operation realized by video/image acquisition mode or any combination thereof It realizes and front end is run into program or other push application switchings to backstage, hang-up or is closed;
Simultaneously/or the second instance or the second system operation push program or using push data run push Program or operation push program local replica or using push data local replica operation push program sheet The service being able to access that can be used when ground copy and/or local program can be called or further clarify the local journey that can be called Other functions that the function and/or running environment that sequence is dynamic link library, control, running environment provide provide;
Simultaneously/or the second instance or the second system preservation push program local replica or there are also push The local replicas of data be stored in the same memory space for specially marking off and or be stored in different special divisions In memory space out or further clarify depositing of being able to access that in the program operation of above-mentioned memory space and above-mentioned push Storage space is the same memory space or the memory headroom run with it is the same memory space;
Simultaneously/or the second instance or the second system operation push program or using push data run push Program or operation push program local replica or using push data local replica operation push program sheet Ground copy is specially to mark off in the memory headroom come to run or further clarify the memory headroom and local program fortune at one The memory headroom of enforcement is well-separated;
Simultaneously/or the second instance or the second system operation push program or using push data run push Program or operation push program local replica or using push data local replica operation push program sheet Access is only capable of when ground copy to be stored in the data for the memory space for specially marking off, cannot access and above-mentioned be stored in special division Data except the data of memory space out are only capable of access and do not pass through by data of Special Empower and/or cannot access It crosses the data of Special Empower or can further be prompted when accessing the above-mentioned data being able to access that and/or the data that cannot be accessed And/or it will record access log;
Simultaneously/or the first instance the first system is connected to communication and/or wired communication mode;
Simultaneously/or the second instance second system is connected to communication and/or wired communication mode;
Simultaneously/or the short-distance wireless communication mode be based on Huawei Hlilink, Mesh, ZigBee, WirelessHART、MiWi、Thread、Z-Wave、LiFi、WiFi、Bluetooth、IrDA、ZigBee、NFC、UWB、DECT Or the communication of RFID technique;
Simultaneously/or the wired communication mode for being not based on analog signal transmission communication media be twisted pair, coaxial cable, Optical cable or data line;
Simultaneously/or the second instance can to receive the push of first instance automatically be after opening automatic received switch Push can just be received automatically or further clarify the automatic received switch can be turned off manually or must be turned off manually Or can be automatically closed or can only be automatically closed or must open manually or can only automatically open or can open manually can also be with It automatically opens or can be turned off manually or be automatically closed.
3. push mode according to claim 2 runs program technic, it is characterised in that:
The active probe is led based on radar, computer vision, other sensors, RFID technique or other network technologies Dynamic detection;
Simultaneously/or the first instance be that the second instance or described first real is perceived by autonomous active probe Body be contacted/non-contact excitation after just carry out active probe and perceive the second instance;
Simultaneously/or the signal that actively issues of the second instance or the third entity include entity identification information, entity net Network mark/address information, digital signature information establish network linking relevant information, the other information that can be used for verifying, request to push away It delivers letters breath, specified request push application message and/or other additional informations;
Simultaneously/or the signal that actively issues of the second instance or the third entity include information completely or partially be plus It is close or still can decrypt/can not decrypt;
Simultaneously/or the first instance be do not carry out active probe but contacted/non-contact excitation after can just receive Signal that the second instance or the third entity actively issue and perceived and receiving the second instance or The first instance is actively to have issued signal and by described first having carried out active probe and thus caused the second instance Entity receives and perceives the second instance;
Simultaneously/or the active probe strategy be physical trigger detection, signal triggering detection, period active probe, timing Active probe and/or uninterrupted active probe;
Simultaneously/or the active probe type be radio signal detection and/or be electric signal detection;
Simultaneously/perhaps the function of the active probe need manually or automatically to enable or further clarify manually or from It is dynamic to enable to be by application entity button, application entity key, application entity switch, operation virtual push button, operation virtual key And/or operation virtual switch realization;
Simultaneously/perhaps the function of the active probe need manually or automatically to close or further clarify manually Or it is virtual by application entity button, application entity key, application entity switch, operation virtual push button, operation for being automatically closed What key and/or operation virtual switch were realized;
/ or wake up the first instance or also wake up it simultaneously and push/executes second described in other functional requirements simultaneously The signal that entity or the third entity actively issue includes specific content, or is further clarified not specific comprising this Content can not then wake up the first instance or also wake up it simultaneously and carry out pushing/executing other functions;
/ or wake up the first instance or also wake up it simultaneously and push/executes second described in other functional requirements simultaneously The signal that entity or the third entity actively issue uses specific format, or further clarifies not specific using this Format can not then wake up the first instance or also wake up it simultaneously and carry out pushing/executing other functions;
Simultaneously/or the signal of specific format its format for actively issuing of the second instance or the third entity be disclosed Format or underground format;
Simultaneously/or signal its format for actively issuing of the second instance or the third entity be that the first instance cannot Recognition and the/required then described first instance are without push;
Simultaneously/or the first instance receive the function of the signal that the second instance or the third entity actively issue and be It is manually or automatically enabled, or further clarify manually or automatically enable be by application entity button, application entity key, Application entity switch, operation virtual push button, operation virtual key and/or operation virtual switch are realized;
Simultaneously/or the first instance receive the function of the signal that the second instance or the third entity actively issue can With what is manually or automatically closed, or further clarifying manually or automatically closing is pressed by application entity button, application entity What key, application entity switch, operation virtual push button, operation virtual key and/or operation virtual switch were realized;
Simultaneously/or perception stage is carried out to the second instance in perception verifying be based in perception from institute It states the entity identification information of second instance acquisition, digital signature information, physical network mark/address information and/or can be used for testing The other information of card;
Simultaneously/or perception stage is carried out to the second instance in perception verifying be based in perception from institute The encryption information for stating second instance acquisition can be decrypted correctly, be able to carry out retrieval and/or be able to carry out comparison;
Simultaneously/or during establishing communication link the first instance is also needed to the second instance and/or described Two entities, which also need the verifying for carrying out the networking stage to the first instance, to be verified based on physical network mark/address information 's;
Simultaneously/or establish the first instance after communication link and obtain the license from the second instance/second system and be First carried out prompt and agree to push in the case where obtain express license or no oppositions push in the case where obtain Tacit declaration license, or further clarifying the operation for agreeing to push is realized by application entity buttons/keys/switch Or it is realized by operation virtual push button/key/switch, or further clarifying the operation for opposing push is to pass through behaviour Make that entity buttons/keys/switch is realized or is realized by operation virtual push button/key/switch;
Simultaneously/or push program or there are also data be completely or partially by symmetric encipherment algorithm or rivest, shamir, adelman It has encrypted;
Simultaneously/or push program or there are also data be completely or partially by homomorphic encryption algorithm or non-homomorphic encryption algorithm It encrypts;
Simultaneously/or push program or there are also data be completely or partially by verifying, by analysis and/or using verifying mould What block was verified;
Simultaneously/or push program or there are also data recognized according to Third Party Authentication label, according to third party It demonstrate,proves certificate and/or is judged whether using Third Party Authentication module through Third Party Authentication;
Simultaneously/or the first instance to the second instance/second system whether have receive push permission test The mode of card is to verify User ID/user name, digital signature/digital certificate and/or the mouth of the second instance/second system Order/password/authorization code, which perhaps further clarifies, all or part of to be needed to input immediately on its input equipment or further bright Really the input is by keyboard, mouse, touch screen, the key of non-keyboard key, switch, voice, camera shooting and/or other sensors Induction input;
Simultaneously/or the second instance/second system also to the first instance/the first system whether have to its push The mode that permission is verified is to verify User ID/user name of the first instance/the first system, digital signature/number card Book and/or password/password/authorization code or further clarify it is all or part of need to input immediately on its input equipment, or Person further clarify it is described input be by keyboard, mouse, touch screen, the key of non-keyboard key, switch, voice, camera shooting and/or Other sensor sensing inputs;
Simultaneously/or the foundation communication link between the two be according to based on being obtained in perception from the second instance Physical network mark/address information and/or establish network linking relevant information to establish;
Simultaneously/or the first instance is gate input module containing permission partial monosomy, other entrance access control systems contain body Part recognition unit partial monosomy, other entrance access control system consoles, household electrical appliance, lamps and lanterns, game machine, navigator, intelligence Household main control device, attendance recorder, cashing machine, POS machine, PIN PAD, ATM, cash recycling system, automatic vending It is machine, automatic machine, Recharging Machine, automatic ticket checker, self-help inquiry apparatus, self-service printer, aviation self-service check-in equipment, more Function self-service terminal, other self-service business handling machines, self-service ticketing machine, magnetic stripe card read-write/reader, chip card read-write/ Reader radio frequency read-write/reader, shared bicycle, shares electric vehicle, shares charger baby managing device in charger baby mode, it Device, the car body automotive electronics of shared commodity are managed in shared commodity, other shared economic models in its shared economic model Control device, vehicular automotive electronic control device, other device for vehicular electronic, the sub- control device of non-motor vehicle, Qi Tafei Motor vehicle device for vehicular electronic, electronic controller for electromechanic apparatus, other electromechanical equipment electronic devices, large and medium-sized electromechanical equipment Console, Console Operated In Medium Or Large Scale Computer Systems, functional mobile phone, smart phone, tablet computer, PDA, laptop, intelligence Wrist-watch, intelligent spire lamella, ammeter, water meter, gas meter, flow meter or other electronic equipment/computer equipments for needing to realize non-contact access;
Simultaneously/or the second instance be functional mobile phone, smart phone, tablet computer, PDA, laptop, smartwatch Or intelligent spire lamella;
Simultaneously/or the third entity be functional mobile phone, smart phone, tablet computer, PDA, laptop, smartwatch Or intelligent spire lamella;
Simultaneously/or the first system be gate, entrance access control system, household electrical appliance, intelligentized Furniture system, attendance system System, marketing system, shared economic model background support system, electronic government affairs system, bank counter system, bank payment system, Online payment system, automobile, other motor vehicles, non-motor vehicle, electromechanical equipment, self-help ticket-buying/fetching system, self-service ticketing system By the first instance when system, SCM system or above system can will be separated as part thereof of first instance Part after separation;
Simultaneously/or the second system be mobile intelligent terminal, wearable smart machine, tablet computer, portable computer or Above system can be by the part after separating the second instance when separating as part thereof of second instance;
Simultaneously/or the automatic received switch be that physical switches virtual switch or existing physical switches have virtually again Switch.
4. the application method that a kind of push mode described in claim 1,2 or 3 runs program technic, it is characterised in that:
Program technic is run using push mode described in claim 1,2 or 3, passes through the second instance or second system The output equipment of system shows the output of push application, or further clarifying above-mentioned output equipment includes the first instance or institute State function, user-friendly and/or conducive to realization output information the secrecy that the output equipment of the first system does not have;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, by the second instance or The input equipment of the second system realizes the input of push application, or further clarifying above-mentioned input equipment includes described the It is function that the input equipment of one entity or the first system does not have, user-friendly and/or be conducive to realize input information Secrecy;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, by the second instance or The input-output equipment of the second system is realized to the program function run on the first instance or the first system Use, or further clarify above procedure function include the second instance or the second system do not have function, Comprising the second instance or the second system can not by function that operation program is realized, use can save expense at This and/or use the consumption that can be reduced to local resource;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, by the second instance or The sheet of the program of the second system operation push or the program for using the data run of push to push or the program of operation push Ground copy or the local replica for the program for using the local replica operation of the data of push to push realize above procedure or also number According to exempt to download, exempt to install and/or exempt from operation and actively run, or further clarify above procedure include the second instance or Function that the second system does not have passes through verifying/information that certification will not collect local original preservation/letter being originally inputted Breath is to be conducive to the letter realized information privacy and/or only analyze local original preservation of the processing by encryption by verifying/certification The information for ceasing/being originally inputted is to be conducive to realize information privacy;
Simultaneously/or push mode described in claim 1,2 or 3 is applied to run program technic, push can be to first system The application that equipment manipulation, data access, data mart modeling, data transmission and/or the other functions of system or the first instance use, To be manipulated by the second instance or second system realization to the equipment of the first system or the first instance, Data access, data mart modeling, data transmission and/or other functions use;
Simultaneously/or push mode described in claim 1,2 or 3 is applied to run program technic, push can be to first system Authentication, authorization and/or the application of authentication of system or the first instance, to pass through the second system or described second Entity realizes the authentication, authorization and/or authentication of the first system or the first instance to it;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, push the second system or The second instance for the first system or the first instance provide its data access, data mart modeling, data transmission and/or The application that other functions use, to realize the second system or the second instance for the first system or described first Entity provides its data access, data mart modeling, data transmission and/or other functions and uses;
Simultaneously/or run program technic using push mode described in claim 1,2 or 3, push the first system or What instant messaging interaction and/or operation between the first instance and the second system or the second instance cooperateed with answers With realizing that instant messaging between the first system or the first instance and the second system or the second instance is handed over Mutually and/or operation cooperates with.
5. the application method that push mode according to claim 4 runs program technic, it is characterised in that:
Push mode described in claim 1,2 or 3 is run into program technic and is applied to shared bicycle, shared automobile, shared electricity It is described in dynamic bicycle, shared clothes, shared charger baby, shared basketball, shared umbrella or the application of shared massage armchair business model First instance is above-mentioned shared bicycle, shared automobile or shared electric bicycle or shared clothes, shared charger baby, shared basket The managing device of ball, shared umbrella or shared massage armchair, the second instance are smart phone, tablet computer or smartwatch, The entity button for pressing the first instance excites the first instance active probe and perceives the second instance or by institute Stating second instance and being put into makes the first instance perceive described second in fact within the scope of the effectively perceive of the first instance Body, the communication linkage and then the first instance then established between the two use shared object to second instance push request The application of product or to further clarify be that the input and output of the corresponding program run on the first instance are pushed to described the It will run on the input-output equipment of two entities or in corresponding program/program and data-pushing to the second instance, user The interactive interface application that can be showed by the input-output equipment of the second instance uses real as described first accordingly The sharing articles of body or the sharing articles of the first instance management, and after submitting application default while having submitted user information Being verified agreement in user information, it can be used or also require its corresponding password/password/authorization code/biological characteristic of input And agree to that it can be used or and is submitting application but while after submitting user information do not requiring also its defeated after being verified Enter corresponding user information and/or password/password/authorization code/biological characteristic and agree to after being verified its can be used or It is automatic/licensed read the user information that locally saves or need to also read the corresponding user information locally saved and/or Password/password/digital certificate/authorization code/biological characteristic simultaneously agrees to that it can be used or automatic/licensed after being verified It reads the user information locally saved or need to also read local corresponding hardware attributes information/software setting information and verify Agree to that it can be used by rear, user can be used directly corresponding sharing articles or mention according to it when agreeing to that it can be used For relevant information go to obtain the use of corresponding sharing articles or further the relevant information is unlocking pin/authorization code;
Or push mode described in claim 1,2 or 3 is run into program technic applied in mobile payment application, described the One entity is that bank settlement device or its front end portion with communication function, the second instance are in above-mentioned mobile payment application Smart phone, tablet computer or smartwatch, the entity button for pressing the first instance excite the first instance actively to visit Surveying and perceive the second instance or being put into the second instance makes within the scope of the effectively perceive of the first instance The first instance perceives the second instance, then establish communication linkage between the two then the first instance to institute Stating the application of second instance push mobile payment or further clarifying is the corresponding program that will be run on the first instance Input and output are pushed on the input-output equipment of the second instance or by corresponding program/program and data-pushing described in It is run on second instance, user can be collected money by the interactive interface that the input-output equipment of the second instance shows And/or payment, or further clarify and directly inputting collecting account information or further clarifying the collecting account information Gathering can be completed for bank account Receiving information/online payment platform account Receiving information or directly inputting payment account Family information and/or have submitted corresponding password/password/authorization code/biological characteristic payment authorization information and after being verified Can be completed payment or it is automatic/licensed read after the collecting account information that locally saves or need to also read it is local corresponding Hardware attributes information/software setting information and after being verified after can be completed gathering or in automatic/licensed reading The payment account information that locally saves also needs to read the corresponding password/password/digital certificate/authorization code/life locally saved The payment authorizations such as object feature information and after being verified after payment can be completed or in the local preservation of automatic/licensed readings Payment account information or also need to read and demonstrate corresponding hardware attributes information/software setting information and after being verified After can be completed payment or interactive interface operation after call local network on payment function and its payment interface have input pay Money account information and/or have submitted payment authorizations information such as corresponding password/password/authorization code/biological characteristic and logical in verifying Later payment can be completed or without inputting any information;
Or claim 1,2 or the 3 push modes are run into program technic and opened applied to electronic safety lock or access control system The Central Shanxi Plain, the first instance are the front end portion of above-mentioned electronic safety lock, access control system or the controllable lockmaking of access control system, described the Two entities are mobile phone, tablet computer or smartwatch, and the entity button for pressing the first instance excites the first instance master It is dynamic to detect and perceive the second instance or the second instance is put into the effectively perceive range close to the first instance The interior or described second instance, which operates sending specific format/content signal by software/hardware thereon, makes the first instance sense Know the second instance, the communication linkage and then the first instance then established between the two are pushed to the second instance The application of lock control or to further clarify be that the input and output of the corresponding program run on the first instance are pushed to institute It states on the input-output equipment of second instance or will be run in corresponding program/program and data-pushing to the second instance, The control that user can be locked by the interactive interface that the input-output equipment of the second instance shows, and having input phase Password/password/authorization code/biological characteristic for answering and after being verified or also it is required to provide corresponding user information can be real Now to the control of lock;
Or by claim 1,2 or the 3 push modes run program technic applied to TV, set-top box, sound equipment, refrigerator, The mechanical, electrical rice cooker of air-conditioning, media player, heating control, electric oven, electric fan, sweeping robot, camera, electrically driven curtain, sky In the remote control application of gas purifier or other household electrical appliance, the first instance is above-mentioned TV, set-top box, sound equipment, refrigerator, sky The mechanical, electrical rice cooker of tune, media player, heating control, electric oven, electric fan, sweeping robot, camera, electrically driven curtain, air Clarifier or other household electrical appliance, the second instance are mobile phone, tablet computer or smartwatch, press the first instance Entity button excites the first instance active probe and perceives the second instance or be put into the second instance close Within the scope of the effectively perceive of the first instance or the second instance by the operation of software/hardware thereon issue specific format/ The signal of content makes the first instance perceive the second instance, and the communication linkage then established between the two is then described It is that will transport on the first instance that first instance, which is applied or further clarified to second instance push household appliance remote control, The input and output of capable corresponding program be pushed on the input-output equipment of the second instance or by corresponding program/program and It is run on data-pushing to the second instance, the interaction that user can be showed by the input-output equipment of the second instance The remote control to household electrical appliance is realized at interface, or is further clarified and needed to input user information before being remotely controlled or also require it It inputs corresponding password/password/authorization code/biological characteristic and is locally protected after being verified or in automatic/licensed reading The user information deposited or the corresponding user information and/or password/password/digital certificate/authorization that need to also locally be saved in reading Code/biological characteristic simultaneously reads the user information that locally saves or need to also read after being verified or automatic/licensed Local corresponding hardware attributes information/software setting information simultaneously can be just remotely controlled after being verified;
Or claim 1,2 or the 3 push modes are run into program technic applied to ATM machine, the number of taking machine, ticket taking machine, purchase Ticket machine, top-up machines or other self-service business handling machines non-contact are in use, the first instance is above-mentioned ATM machine, self-service looks into Inquiry machine, the number of taking machine, ticket taking machine, booking machine, top-up machines or other self-service business handling machines, the second instance are mobile phone, plate Computer or smartwatch, the entity button for pressing the first instance excite the first instance active probe and perceive described The second instance is put within the scope of the effectively perceive close to the first instance or the second instance leads to by second instance Crossing the sending specific format/content signal of software/hardware operation thereon makes the first instance perceive the second instance, so The communication linkage and then the first instance established afterwards between the two push the non-of self-service business handling machine to the second instance It is that the input and output of the corresponding program run on the first instance are pushed to institute that touch operation, which is applied or further clarified, It states on the input-output equipment of second instance or will be run in corresponding program/program and data-pushing to the second instance, User can be realized by the interactive interface that the input-output equipment of the second instance shows to above-mentioned self-service business handling machine Touchless manipulation, or further clarify and need to input user information before being remotely controlled or also require its input corresponding close Code/password/authorization code/biological characteristic and the user information locally saved after being verified or in automatic/licensed reading Or need to also it read the corresponding user information locally saved and/or password/password/digital certificate/authorization code/biological characteristic simultaneously It reads the user information that locally saves after being verified or automatic/licensed or need to also read local corresponding hardware Attribute information/software setting information simultaneously just can be carried out Touchless manipulation after being verified;
Or claim 1,2 or the 3 push modes are run into program technic and are applied to closely using function in, It is desktop computer, portable computer, mobile phone, tablet computer or smartwatch that the first instance, which is entity, described second Entity is mobile phone, tablet computer or smartwatch, and the entity button for pressing the first instance excites the first instance actively It detects and perceives the second instance or the second instance is put within the scope of the effectively perceive of the first instance Or the second instance issues specific format/content signal by the operation of software/hardware thereon or is connected with specific data line Connecing the first instance and the second instance makes the first instance perceive the second instance, then establishes between the two Communication linkage then the first instance to the second instance push closely using function application or further it is bright The input and output of the corresponding program run on the first instance are really pushed to the input-output equipment of the second instance It will run above or in corresponding program/program and data-pushing to the second instance, user can pass through the second instance The interactive interface that shows of input-output equipment realize the short distance of the first instance function used or further clarified Above-mentioned function is the function and/or be the function that its peripheral hardware has that the first instance host itself has, or further bright It really needs to input user information before carrying out short distance use or it is also required to input corresponding password/password/authorization code/biology It feature and reads the user information that locally saves after being verified or automatic/licensed or need to also read local save Corresponding user information and/or password/password/digital certificate/authorization code/biological characteristic and after being verified or from It is dynamic/licensed to read the user information locally saved or also read local corresponding hardware attributes information/software setting letter It ceases and just can be carried out after being verified and closely use;
Or claim 1,2 or the 3 push modes are run into program technic and are applied in the closely application of reading, it is described First instance is that the ammeter that entity is electronization, water meter, gas meter, flow meter, the gauge table of other inconvenient meter readings or other sensors are read Number device, the second instance are mobile phone, tablet computer or smartwatch, are pressed described in the entity button excitation of the first instance First instance active probe simultaneously perceives the second instance or the second instance is put into having close to the first instance In effect sensing range or the second instance is issued described in specific format/content signal makes by the operation of software/hardware thereon First instance perceives the second instance, then establish communication linkage between the two then the first instance to described the It is the defeated of the corresponding program that will be run on the first instance that two entities, which push the closely application of reading or further clarify, Enter output to be pushed on the input-output equipment of the second instance or by corresponding program/program and data-pushing to described the Two physically run, and user can be realized by interactive interface that the input-output equipment of the second instance shows to described the The short distance of one entity is read, or is further clarified and needed to input user information before carrying out short distance use or also require it It inputs corresponding password/password/authorization code/biological characteristic and is locally protected after being verified or in automatic/licensed reading The user information deposited or the corresponding user information and/or password/password/digital certificate/authorization that need to also locally be saved in reading Code/biological characteristic simultaneously reads the user information that locally saves or need to also read after being verified or automatic/licensed Local corresponding hardware attributes information/software setting information simultaneously just can be carried out closely reading after being verified.
6. a kind of method for protecting information security, it is characterised in that:
Program technic or push mode described in claim 4 or 5 are run from push mode described in claim 1,2 or 3 Running all or part of input in the application method of program technic is the input equipment by second instance or second system The input equipment of non-first instance or the first system itself carries out input to be conducive to realize what the secrecy for inputting information extracted All or part of input is by from separating with itself or another carry out input in additional input terminal itself or further expand The input terminal is believable;
Simultaneously/either program technic or described in claim 4 or 5 is run from push mode described in claim 1,2 or 3 It is by by second instance or second system that push mode, which runs all or part of output in the application method of program technic, Input equipment rather than the output equipment of first instance or the first system itself carries out output to be conducive to realize output information The all or part of output extracted that maintains secrecy be from it is being separated with itself or it is another additional output end itself carry out output or into It is believable that one step, which expands the output end,;
Simultaneously/either program technic or described in claim 4 or 5 is run from push mode described in claim 1,2 or 3 It is by testing that it is by the program of verifying extracted that push mode, which runs the program of the push in the application method of program technic, Card and combine expand can confirm that the program can protect information security or further clarify that can confirm by verifying will not It is not authorized access locally save information, licensed will not pass the information locally saved that can be decrypted correctly back, will not The not licensed information for passing the local input that can be decrypted correctly back, will not the local that can be decrypted correctly of licensed preservation it is defeated The information that enters only passes the information locally saved that cannot be decrypted correctly, the letter for only passing the local input that cannot be decrypted correctly back back Breath only saves the information locally saved that cannot be decrypted correctly and/or only saves the information for the local input that cannot be decrypted correctly;
Simultaneously/either program technic or described in claim 4 or 5 is run from push mode described in claim 1,2 or 3 The program that push mode runs the push in the application method of program technic is to be by the program of Third Party Authentication extracted By Third Party Authentication and combine expand can be confirmed by Third Party Authentication can protect information security or further it is bright Can really confirm authorized will not access the information locally saved, licensed will not pass the local preservation that can be decrypted correctly back Information, licensed will not pass the local input that can be decrypted correctly back information, will not licensed preservation can be correct The information of the local input of decryption only passes the information locally saved that cannot be decrypted correctly back, only passes back and cannot be decrypted correctly The information of local input only saves the information locally saved that cannot be decrypted correctly and/or only saves the sheet that cannot be decrypted correctly The information of ground input.
7. the method for protection information security according to claim 6, it is characterised in that:
The information locally saved that cannot be decrypted correctly passed back or saved be use homomorphic encryption algorithm to encrypt still can be with It is analyzed and processed in the case of non-decrypting;
Simultaneously/or the information of the local input that cannot be decrypted correctly passing back or save encrypted using homomorphic encryption algorithm Still it can be analyzed and processed in the case of non-decrypting;
Simultaneously/or input terminal is pushed to after user authentication relevant information is pushed to or is encrypted when carrying out user authentication To carry out user authentication or further clarify the user authentication relevant information to be except user name/user name is other in input terminal Information, digital signature, digital certificate, password, password or the authorization code or above-mentioned that user authentication except equivalent information needs It is information that user authentication in addition to the other equivalent informations of user name/user name needs, digital signature, digital certificate, password, close Code or authorization code are to be pushed to input terminal again after being retrieved according to the other equivalent informations of user name/user name;
Simultaneously/or the information one that will with the information of local input and/or locally be saved when carrying out information analysis processing With the information being analyzed and processed input terminal is pushed to or is pushed to after encrypting to be analyzed and processed in input terminal;
Simultaneously/or when carrying out user authentication by user authentication relevant information and local input related with user authentication Information be pushed to or be pushed to after encrypting together third party together user authentication or further clarify in third party The user authentication relevant information is the information of the user authentication needs in addition to the other equivalent informations of user name/user name, number Word signature, digital certificate, password, password or authorization code or the above-mentioned use in addition to the other equivalent informations of user name/user name Information, digital signature, digital certificate, password, password or the authorization code that family certification needs are other according to the user name/user name Equivalent information is pushed to input terminal after being retrieved again;
Simultaneously/or when carrying out information analysis processing by need analyze processing information and local input information and/ Or the information locally saved is pushed to or is pushed to after encrypting together third party together to be analyzed and processed in third party;
Simultaneously/or the information of the above-mentioned local input that cannot be decrypted correctly be only applicable to personal information and/or personal hidden It is structured message and/or unstructured information that personal letter, which ceases or further clarify above- mentioned information,;
Simultaneously/or the above-mentioned information locally saved that cannot be decrypted correctly is only applicable to personal information and/or individual is hidden It is structured message and/or unstructured information that personal letter, which ceases or further clarify above- mentioned information,.
8. the application method of the method for protection information security described in a kind of claim 6 or 7, it is characterised in that:
By in the approach application of protection information security described in claim 6 or 7 to B/S mode or the software systems of C/S model, It is allowed in the software section of user terminal operation will not authorized access local by verifying or Third Party Authentication confirmation The information of preservation licensed will not pass that the information locally saved that can be decrypted correctly, licensed will not pass back can back The information for the local input being decrypted correctly, will not the local input that can be decrypted correctly of licensed preservation information, only pass back The information locally saved that cannot be decrypted correctly, the information for only passing the local input that cannot be decrypted correctly back, only preservation cannot be just The information locally saved really decrypted and/or the information for only saving the local input that cannot be decrypted correctly;
Or by the software system of the approach application of protection information security described in claim 6 or 7 to B/S mode or C/S model On system, user authentication be user terminal complete or further clarify be backstage according to user terminal input user name or its Its equivalent information is pushed to user terminal from being retrieved after relevant authentication information is pushed to or encrypts in background user authentication information Completion compared with carrying out analysis with other information related with user authentication of user terminal input again;
Or by the software system of the approach application of protection information security described in claim 6 or 7 to B/S mode or C/S model On system, user authentication be third party complete or further clarify be backstage according to user terminal input user name or its Its equivalent information retrieves relevant authentication information from background user authentication information and recognizes with the other and user that user terminal inputs It demonstrate,proves related information and is pushed to or is pushed to after encrypting together third party together and carry out analyzing again and compare completion;
Or by the software system of the approach application of protection information security described in claim 6 or 7 to B/S mode or C/S model On system, it is encryption that information collection, which is in user terminal completion and wherein collected personal information and/or individual privacy information, Be stored in third party, need using when file a request to the third party and corresponding information to be decrypted by third party and execute phase The processing or the non-decrypting processing directly executed answered, or further clarifying is that will provide after the video image information specified decryption To judicial authority, will by wherein in plain text save specified E-mail address information send mail, will wherein be added with homomorphic encryption algorithm Close specify information directly carries out calculation process simultaneously feedback result or the phone number that will wherein specify in the case of non-decrypting Short message is sent after code information decryption.
9. a kind of device realized push mode described in claim 1,2 or 3 and run program technic, it is characterised in that: include As first instance driving means or further clarify the driving means be fixed equipment, semifixed equipment, portable meter Calculation machine, tablet computer, mobile terminal or wearable device and as second instance reception driving means or further clarify The reception driving means is portable computer, tablet computer, mobile terminal or wearable device, or also comprising with described the Second described in the push source device of the first system as described in of one entity connection and/or the conduct being connected to the second instance The push destination apparatus of system, the whole for the program that first instance is currently running the first system of itself and/or its connection or Part output is with short-distance wireless communication mode and/or is not based on the wired communication mode of analog signal transmission and pushes away through second instance It is sent on the output equipment of the second system of its connection and realizes output, or all or part of output is with short-distance wireless communication side Formula and/or the wired communication mode for being not based on analog signal transmission are pushed to the portable computer as second instance, plate electricity Realize that output, or all or part of input are led to short-distance wireless on the output equipment of brain, mobile terminal or wearable device Letter mode and/or it is not based on the second system that the wired communication mode of analog signal transmission is pushed to its connection through second instance Realize that input, or all or part of input with short-distance wireless communication mode and/or are not based on analog signal on input equipment The wired communication mode of transmission is pushed to the portable computer as second instance, tablet computer, mobile terminal or wearable sets Realize input on standby input equipment, or all or part of input and output are simultaneously with short-distance wireless communication mode and/or non- It is pushed to the input and output of the second system of its connection simultaneously through second instance based on the wired communication mode of analog signal transmission Realize that input and output, or all or part of input and output with short-distance wireless communication mode and/or are not based on simultaneously in equipment The wired communication mode of analog signal transmission be pushed to the portable computer as second instance, tablet computer, mobile terminal or Input and output are realized on the input-output equipment of wearable device;
Or
Comprising the driving means as first instance or further clarifies the driving means and be fixed equipment, semifixed set Standby, portable computer, tablet computer, mobile terminal or wearable device and as second instance reception driving means or into The clearly described reception driving means of one step is portable computer, tablet computer, mobile terminal or wearable device, or also includes The push source device for the first system as described in being connected to the first instance and/or the conduct being connected to the second instance The push destination apparatus of the second system, first instance is the first system storage be locally stored and/or its connection Program or there are also data with short-distance wireless communication mode and/or to be not based on the wired communication mode of analog signal transmission and be pushed to Operation or be pushed on the second system of its connection through second instance is run and the second instance or described the on second instance Two system runs the program of above-mentioned push or at least to use it when using the program of the above-mentioned push of data run of above-mentioned push Input equipment carries out input or export using its output equipment or input using its input and output device simultaneously defeated Out, or locally there has been the program of above-mentioned push in the second instance or the second system or there are also the copies of data In the case of the first instance do not push above procedure or there are also data whole or further clarify only push for retrieval this The segment of ground copy and the second instance or the second system directly transfer corresponding local according to the segment of above-mentioned push Copy runs and its input equipment at least to be used to receive input or carry out output using its output equipment or use its defeated simultaneously Enter and carries out input and output with output equipment.
10. a kind of sending signal specific distinguishes RFID approach, it is characterised in that:
Push mode as claimed in claim 3 is run the wake-up first instance in program technic or also wakes up it simultaneously and is pushed away The signal for sending/executing other functional requirement second instances or third entity actively to issue includes specific content and/or uses special First instance in fixed format is clearly that signal is received based on RFID technique, is thus extracted by the inclusion of specific interior Hold and/or wakes up RFID realization using the signal of specific format to the recognition of RFID or further clarify not comprising spy Fixed content and/or then the signal can not wake up the RFID and realize recognition to the RFID using the specific format, or Also requiring specific content should be in the foremost portion of whole signals and/or the frequency range of the frequency range and RFID feedback that issue signal Different;
Or in front on the basis of, the RFID include can be directly used for determine the time data, can be directly used for determine position Data and/or can be directly used for execute instruction or further clarify the RFID be by association clock can be direct to obtain Determine the data of time, the RFID be by coordinate interrelation module with obtain can be directly used for determine position data and/ Or the RFID is by associated instructions generator or command memory to obtain the instruction that can be directly used for executing.
CN201810912452.5A 2018-08-11 2018-08-11 A kind of push mode runs program technic and its application method, correlation technique Pending CN109151012A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810912452.5A CN109151012A (en) 2018-08-11 2018-08-11 A kind of push mode runs program technic and its application method, correlation technique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810912452.5A CN109151012A (en) 2018-08-11 2018-08-11 A kind of push mode runs program technic and its application method, correlation technique

Publications (1)

Publication Number Publication Date
CN109151012A true CN109151012A (en) 2019-01-04

Family

ID=64792953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810912452.5A Pending CN109151012A (en) 2018-08-11 2018-08-11 A kind of push mode runs program technic and its application method, correlation technique

Country Status (1)

Country Link
CN (1) CN109151012A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110522595A (en) * 2019-08-28 2019-12-03 上海幸卓智能科技有限公司 A kind of massage armchair function control data creation method and system, terminal
CN111262884A (en) * 2020-03-16 2020-06-09 陈力 Smart home access authorization method and device, smart home system and server
WO2020155014A1 (en) * 2019-01-31 2020-08-06 华为技术有限公司 Smart home device sharing system and method, and electronic device
CN111984955A (en) * 2020-08-20 2020-11-24 浙江荣泰健康电器有限公司 Use method of shared massage chair
WO2021109309A1 (en) * 2019-12-04 2021-06-10 上海擎感智能科技有限公司 Information processing method, device, and computer storage medium
CN113784324A (en) * 2020-05-22 2021-12-10 西蒙电气(中国)有限公司 Convenient access method for realizing intelligent device containing Bluetooth beacon
TWI769712B (en) * 2021-02-24 2022-07-01 旺玖科技股份有限公司 System and method for achieving display of carplay operation interface on display screens of multiple electronic devices integrated in motor-driven transportation means
WO2023020393A1 (en) * 2021-08-18 2023-02-23 华为技术有限公司 Method for sharing remote controller between devices, and sending end device and receiving end device
TWI800791B (en) * 2020-08-19 2023-05-01 大陸商中國銀聯股份有限公司 Biometric information-based authentication method, device, computer system, and computer-readable storage medium
US11676432B2 (en) 2020-03-17 2023-06-13 Sony Group Corporation Electronic device, an access control device, and related methods

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605332A (en) * 2009-06-26 2009-12-16 北京鼎盛光华科技有限责任公司 Vehicle multi-mode wireless network communication system
US7715873B1 (en) * 2006-06-23 2010-05-11 Sprint Communications Company L.P. Wearable accessories providing visual indicia of incoming events for wireless telecommunications device
CN104506534A (en) * 2014-12-25 2015-04-08 青岛微智慧信息有限公司 Safety communication secret key negotiation interaction scheme
CN104754514A (en) * 2015-03-26 2015-07-01 广东欧珀移动通信有限公司 File push method and device and file receiving method and device
CN104767775A (en) * 2014-01-06 2015-07-08 腾讯科技(深圳)有限公司 Webpage application information push method and webpage application information push system
CN106133684A (en) * 2014-03-27 2016-11-16 微软技术许可有限责任公司 Support the dynamic behaviour in static compilation program
CN107145278A (en) * 2016-03-01 2017-09-08 阿里巴巴集团控股有限公司 Apparatus control method, device and mobile terminal based on mobile terminal
CN107491795A (en) * 2016-06-13 2017-12-19 摩托罗拉移动有限责任公司 Silent RFID states and recovery

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7715873B1 (en) * 2006-06-23 2010-05-11 Sprint Communications Company L.P. Wearable accessories providing visual indicia of incoming events for wireless telecommunications device
CN101605332A (en) * 2009-06-26 2009-12-16 北京鼎盛光华科技有限责任公司 Vehicle multi-mode wireless network communication system
CN104767775A (en) * 2014-01-06 2015-07-08 腾讯科技(深圳)有限公司 Webpage application information push method and webpage application information push system
CN106133684A (en) * 2014-03-27 2016-11-16 微软技术许可有限责任公司 Support the dynamic behaviour in static compilation program
CN104506534A (en) * 2014-12-25 2015-04-08 青岛微智慧信息有限公司 Safety communication secret key negotiation interaction scheme
CN104754514A (en) * 2015-03-26 2015-07-01 广东欧珀移动通信有限公司 File push method and device and file receiving method and device
CN107145278A (en) * 2016-03-01 2017-09-08 阿里巴巴集团控股有限公司 Apparatus control method, device and mobile terminal based on mobile terminal
CN107491795A (en) * 2016-06-13 2017-12-19 摩托罗拉移动有限责任公司 Silent RFID states and recovery

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020155014A1 (en) * 2019-01-31 2020-08-06 华为技术有限公司 Smart home device sharing system and method, and electronic device
CN113272745A (en) * 2019-01-31 2021-08-17 华为技术有限公司 Smart home equipment sharing system and method and electronic equipment
CN110522595A (en) * 2019-08-28 2019-12-03 上海幸卓智能科技有限公司 A kind of massage armchair function control data creation method and system, terminal
WO2021109309A1 (en) * 2019-12-04 2021-06-10 上海擎感智能科技有限公司 Information processing method, device, and computer storage medium
CN111262884A (en) * 2020-03-16 2020-06-09 陈力 Smart home access authorization method and device, smart home system and server
CN111262884B (en) * 2020-03-16 2021-06-11 佛山市诚名信息科技有限公司 Smart home access authorization method and device, smart home system and server
US11676432B2 (en) 2020-03-17 2023-06-13 Sony Group Corporation Electronic device, an access control device, and related methods
CN113784324A (en) * 2020-05-22 2021-12-10 西蒙电气(中国)有限公司 Convenient access method for realizing intelligent device containing Bluetooth beacon
TWI800791B (en) * 2020-08-19 2023-05-01 大陸商中國銀聯股份有限公司 Biometric information-based authentication method, device, computer system, and computer-readable storage medium
CN111984955A (en) * 2020-08-20 2020-11-24 浙江荣泰健康电器有限公司 Use method of shared massage chair
TWI769712B (en) * 2021-02-24 2022-07-01 旺玖科技股份有限公司 System and method for achieving display of carplay operation interface on display screens of multiple electronic devices integrated in motor-driven transportation means
WO2023020393A1 (en) * 2021-08-18 2023-02-23 华为技术有限公司 Method for sharing remote controller between devices, and sending end device and receiving end device

Similar Documents

Publication Publication Date Title
CN109151012A (en) A kind of push mode runs program technic and its application method, correlation technique
EP3312750B1 (en) Information processing device, information processing system, and information processing method
US10198598B2 (en) Information processing device and method, program, and recording medium
CN1918526B (en) Information management device and information management method
CN104915829B (en) Exchange method and device are applied based on NFC technique
JP2010533344A (en) Identity authentication and protection access system, components, and methods
JP2010505161A5 (en)
CN104050510A (en) Intelligent room reservation system based on mobile terminal
CN104794388B (en) application program access protection method and application program access protection device
KR20150110515A (en) Method for authentication a user with respect to a machine
KR20150090099A (en) Nfc-based fingerprint authentication system and fingerprint authentication method
CN105827656B (en) Identity identifying method and device based on NFC payment
CN103081411A (en) Network service
CN103942897A (en) Method for money withdrawing without card on ATM
CN105205944A (en) Self-service deposit and withdrawal system based on intelligent terminal
CN111860016A (en) Information display method and device for Near Field Communication (NFC) and electronic equipment
WO2019114782A1 (en) Cloud biometrics authentication payment and retail management system, and payment method
CN109166216A (en) A kind of control method and device of smart bluetooth door lock
CN105701386A (en) Security certification method and device
CN101019366A (en) Method for realizing volatile secret key and separated checking module by collecting human characteristic
CN101615318A (en) E-payment system and device thereof
CN113382405A (en) Network space information security control method and application
CN109640297A (en) No card interactive system and simulation card apparatus
CN101577656A (en) Control display and network system substituting integrated circuit card
CN106910068B (en) Multi-algorithm multi-key optical authentication offline payment method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190104