CN109471810A - A kind of take-effective method and device of hardware configuration - Google Patents

A kind of take-effective method and device of hardware configuration Download PDF

Info

Publication number
CN109471810A
CN109471810A CN201811354078.8A CN201811354078A CN109471810A CN 109471810 A CN109471810 A CN 109471810A CN 201811354078 A CN201811354078 A CN 201811354078A CN 109471810 A CN109471810 A CN 109471810A
Authority
CN
China
Prior art keywords
memory
product
configuration data
legal
headroom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811354078.8A
Other languages
Chinese (zh)
Other versions
CN109471810B (en
Inventor
肖占慧
亓浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811354078.8A priority Critical patent/CN109471810B/en
Publication of CN109471810A publication Critical patent/CN109471810A/en
Application granted granted Critical
Publication of CN109471810B publication Critical patent/CN109471810B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/0223User address space allocation, e.g. contiguous or non contiguous base addressing
    • G06F12/023Free address space management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of take-effective method of hardware configuration and devices, this method comprises: reading product check information stored in memory;Judge whether the product memory belongs to legal memory according to the check information;If the product memory belongs to legal memory, the configuration data of the product memory is generated;Judge whether the configuration data and the memory headroom of the product memory match;If the configuration data and the memory headroom of the product memory match, the configuration data is made to come into force.It can be seen that, this method is by determining that product memory belongs to legal memory and determines that configuration data and the memory headroom of product memory match, to guarantee that product memory is the requirement product of user, and, coming into force for hardware configuration is completed during carrying out hardware configuration upgrading, improves the efficiency of product up-gradation.

Description

A kind of take-effective method and device of hardware configuration
Technical field
This application involves the take-effective methods and device of field of computer technology more particularly to a kind of hardware configuration.
Background technique
During research and development of products, it is often necessary to be defined to the configuration of hardware, so that software is in the hardware of restriction Configuration is lower to be used.But user proposes to upgrade the product bought sometimes, due to before during using product The hardware of the product is defined, so software section is also required to change configuration data, the process after HardwareUpgring As hardware configuration upgrades.
In order to facilitate hardware configuration upgrading, software upgrade package service can be used, that is, user need to only buy upgrade package, will Upgrade package is placed under the particular file folder of product systems, and restarting system can be completed hardware configuration upgrading.Hardware configuration upgrading one As be memory upgrade, at this moment may relate to redistributing to memory, under different memory configurations, software service (i.e. network industry Business or local service) difference is also had, so may also relate to the starting of certain services, and therefore, after having upgraded hardware configuration, It during system reboot, needs to redistribute memory (including to the service having been started up before upgrading and new starting Service carry out Memory Allocation), this process is known as coming into force for hardware configuration, and therefore, how the legal effectively hardware that comes into force is matched It sets, is current problem to be solved.
Summary of the invention
The main purpose of the embodiment of the present application is to provide the take-effective method and device of a kind of hardware configuration, legal can have The hardware configuration that comes into force of effect.
A kind of take-effective method of hardware configuration provided by the embodiments of the present application, comprising:
Read product check information stored in memory;
Judge whether the product memory belongs to legal memory according to the check information;
If the product memory belongs to legal memory, the configuration data of the product memory is generated;
Judge whether the configuration data and the memory headroom of the product memory match;
If the configuration data and the memory headroom of the product memory match, the configuration data is made to come into force.
Optionally, if the product memory belongs to legal memory, the check information is by the mark of the product memory What knowledge information obtained after being encrypted.
Optionally, the identification information is that the product ID SN or the SN of the product memory are formed with other information Combined information.
It is optionally, described to judge whether the product memory belongs to legal memory according to the check information, comprising:
Using the decruption key obtained in advance, the check information is decrypted, decrypted result is obtained;
The decrypted result is compared with the identification information obtained in advance;
If the decrypted result is identical as the identification information, it is determined that the product memory belongs to legal memory;If institute It is different from the identification information to state decrypted result, it is determined that the product memory is not belonging to legal memory.
It is optionally, described to judge whether the configuration data and the memory headroom of the product memory match, comprising:
If the memory headroom limited in the configuration data exceeds the memory space of the product memory, it is determined that described to match It sets data and the memory headroom of the product memory does not match that;
If the memory headroom limited in the configuration data is without departing from the memory space of the product memory, it is determined that described Configuration data and the memory headroom of the product memory match.
A kind of device that comes into force of hardware configuration provided by the embodiments of the present application, comprising:
Reading unit, for reading product check information stored in memory;
First judging unit, for judging whether the product memory belongs to legal memory according to the check information;
Generation unit generates the configuration data of the product memory if belonging to legal memory for the product memory;
Second judgment unit, for judging whether the configuration data and the memory headroom of the product memory match;
Validation unit makes described match if matching for the configuration data and the memory headroom of the product memory Data are set to come into force.
Optionally, if the product memory belongs to legal memory, the check information is by the mark of the product memory What knowledge information obtained after being encrypted.
Optionally, the identification information is that the product ID SN or the SN of the product memory are formed with other information Combined information.
Optionally, first judging unit, comprising:
Subelement is decrypted, for being decrypted, being decrypted to the check information using the decruption key obtained in advance As a result;
Contrast subunit, for comparing the decrypted result with the identification information obtained in advance;
First determines subelement, if identical as the identification information for the decrypted result, it is determined that in the product It deposits and belongs to legal memory;If the decrypted result is different from the identification information, it is determined that it is legal that the product memory is not belonging to Memory.
Optionally, the second judgment unit, comprising:
Second determines subelement, if the depositing beyond the product memory of the memory headroom for limiting in the configuration data Store up space, it is determined that the configuration data and the memory headroom of the product memory do not match that;If being limited in the configuration data Memory space of the fixed memory headroom without departing from the product memory, it is determined that the configuration data is interior with the product memory Space is deposited to match.
It can be seen that the embodiment of the present application has the following beneficial effects:
The take-effective method and device of hardware configuration provided by the embodiments of the present application, by reading product school stored in memory Test information;Judge whether the product memory belongs to legal memory according to the check information;If the product memory belongs to conjunction Method memory then generates the configuration data of the product memory;Judge the memory headroom of the configuration data Yu the product memory Whether match;If the configuration data and the memory headroom of the product memory match, the configuration data is made to come into force. As it can be seen that method provided by the present application is by determining that product memory belongs to legal memory and determine configuration data and product memory Memory headroom matches, to guarantee that product memory is the requirement product of user, and, during carrying out hardware configuration upgrading Coming into force for hardware configuration is completed, the efficiency of product up-gradation is improved.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the application Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is a kind of take-effective method flow chart of hardware configuration provided by the embodiments of the present application;
Fig. 2 is provided by the embodiments of the present application a kind of to judge whether product memory belongs to legal memory according to check information Method flow diagram;
Fig. 3 is a kind of composition schematic diagram of the device that comes into force of hardware configuration provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
The embodiment of the present application can be applied in the scene upgraded to product.
When user is during using product, the product bought is upgraded sometimes, such as: user would generally Some storage chips are added into product to promote the memory of product, or the section components in product can also be replaced and be become second nature It can more preferably component etc..The process is the escalation process of hardware.And due to being defined before to the hardware of the product, So software section is also required to change configuration data after HardwareUpgring, which is hardware configuration upgrading.
In the prior art, usually after having upgraded hardware configuration, during system reboot, memory is divided again Match, this process is known as coming into force for hardware configuration.In this way, reducing the efficiency of product up-gradation process.
Based on the problems of the prior art, the embodiment of the present application provides a kind of take-effective method of hardware configuration, to solve The problems of the prior art.
It, can be with the figure shows a kind of take-effective method flow chart of hardware configuration provided by the embodiments of the present application referring to Fig. 1 Including step S101-S105:
S101: product check information stored in memory is read.
In specific application scenarios, user is usually that the portions such as storage chip are added into product to the upgrading of products-hardware The components such as these storage chips then can be known as product memory to promote the memory of product by part.
In the present embodiment, it can be all previously stored in product memory for examining the product memory whether legal Check information, and can store different check informations in different product memories.Wherein, check information such as can be pre- The license passport (license) being first stored in product memory.In this way, being added in system by software upgrade package to hardware When carrying out configuration upgrading, pre-stored check information in upgrading products memory can be read first.
S102: judge whether the product memory belongs to legal memory according to check information.
In the present embodiment, it after reading product check information stored in memory, can be read according to this Check information judges whether product memory belongs to legal memory.
In a kind of implementation of the present embodiment, referring to fig. 2, the figure shows a kind of provided by the embodiments of the present application Judge whether product memory belongs to the method flow diagram of legal memory according to check information, may include step S201-S203:
S201: using the decruption key obtained in advance, the check information is decrypted, decrypted result is obtained.
In the present embodiment, check information can be the information encrypted by encryption key, upgrade in hardware configuration During, the decruption key for check information to be decrypted can be got in advance, using the decruption key to verification Information is decrypted, and obtains decrypted result.
S202: decrypted result is compared with the identification information obtained in advance.
In the present embodiment, the identification information of the storage product can be obtained in advance, and check information will be decrypted Decrypted result compared with the identification information obtained in advance, to judge whether the product memory belongs to legal memory.
S203: if the decrypted result is identical as the identification information, it is determined that the product memory belongs to legal memory; If the decrypted result is different from the identification information, it is determined that the product memory is not belonging to legal memory.
In the present embodiment, it is to be understood that after passing through judgement, if decrypted result is identical as identification information, It can then determine that the product memory belongs to legal memory;If decrypted result is different from identification information, the product can be determined Memory is not belonging to legal memory.
S103: if the product memory belongs to legal memory, the configuration data of the product memory is generated.
In the present embodiment, if the product can be generated by judging to determine that the product memory belongs to legal memory The configuration data of memory.Wherein, configuration data can be the number that software upgrade package carries out configuration restriction to the product memory of addition According to so that software uses in the product memory of the addition.
In a kind of implementation of the present embodiment, if product memory belongs to legal memory, check information is by product What the identification information of memory obtained after being encrypted.
In the present embodiment, can in advance to legal product memory, by the identification information of product memory encrypt into And check information is obtained, and the checking information is stored into legal product memory.Wherein, identification information can be with accordingly Product memory is relevant and product ID (Serial with the one-to-one information of product memory, such as product memory Number, SN), Part No. (part Number, PN).Therefore, judging that product memory belongs to according to the check information got When legal, which obtained after being encrypted the identification information of product memory.
In a kind of implementation of the present embodiment, identification information be product memory product ID SN or SN with it is other The combined information that information is formed.
In the present embodiment, identification information can be the product ID SN of product memory, or by SN and other letters Cease the combined information formed.Such as: it can be using the combined information of the SN of product memory and PN as the product sequence of the product memory Row number.
S104: judge whether the configuration data and the memory headroom of the product memory match.
In the present embodiment, after saving as legal memory in the product added by determining, judgement is also needed in step s 102 Whether the configuration data of generation and the memory headroom of the product memory match, to determine that the product memory and software upgrade package are raw The configuration data of production matches.
In a kind of implementation of the present embodiment, judge whether configuration data and the memory headroom of product memory match Method include:
If the memory headroom limited in configuration data exceeds the memory space of product memory, it is determined that configuration data and product The memory headroom of memory does not match that;
If the memory headroom limited in configuration data is without departing from the memory space of product memory, it is determined that configuration data and production The memory headroom of product memory matches.
In the present embodiment, the method for judging whether the memory headroom of configuration data and product memory matches may is that If the memory headroom limited in configuration data exceeds the memory space of product memory itself, it can determine configuration data and be somebody's turn to do The memory headroom of product memory does not match that.Such as: the memory headroom limited in configuration data is 10G, and the product memory Memory space is 8G, then the memory headroom limited in configuration data has exceeded the memory space of the product memory, therefore can be true Determine configuration data and the memory headroom of the product memory does not match that.If the memory headroom limited in configuration data is without departing from production The memory space of product memory itself can then determine that configuration data and the memory headroom of the product memory match.Such as: configuration The memory headroom limited in data is 8G, and the memory space of the product memory is 10G, then the memory limited in configuration data is empty Between without departing from the product memory memory space, thus may determine that the memory headroom of configuration data and the product memory not phase Match.
S105: if the configuration data and the memory headroom of the product memory match, keep the configuration data raw Effect.
In the present embodiment, after determining whether the memory headroom of configuration data and the product memory matches, then may be used The service thinking the service having been turned on before upgrading and newly starting carries out redistributing for memory, that is, carries out coming into force for configuration data.
To sum up, the take-effective method and device of hardware configuration provided by the embodiments of the present application is deposited by reading in product memory The check information of storage;Judge whether the product memory belongs to legal memory according to the check information;If the product memory Belong to legal memory, then generates the configuration data of the product memory;Judge the interior of the configuration data and the product memory Deposit whether space matches;If the configuration data and the memory headroom of the product memory match, make the configuration number According to coming into force.As it can be seen that method provided by the present application by determine product memory belong to legal memory and determine configuration data and produce The memory headroom of product memory matches, to guarantee that product memory is the requirement product of user, and, carrying out hardware configuration upgrading During i.e. complete coming into force for hardware configuration, improve the efficiency of product up-gradation.
Referring to Fig. 3, the figure shows a kind of composition signals of the device that comes into force of hardware configuration provided by the embodiments of the present application Figure, comprising:
Reading unit 301, for reading product check information stored in memory;
First judging unit 302, for judging whether the product memory belongs to legal memory according to the check information;
Generation unit 303 generates the configuration number of the product memory if belonging to legal memory for the product memory According to;
Second judgment unit 304, for judge the configuration data and the product memory memory headroom whether phase Match;
Validation unit 305 makes described if matching for the configuration data and the memory headroom of the product memory Configuration data comes into force.
In a kind of implementation of the present embodiment, if the product memory belongs to legal memory, the check information It is to be obtained after being encrypted the identification information of the product memory.
In a kind of implementation of the present embodiment, the identification information be the product memory product ID SN or The combined information that the SN and other information are formed.
In a kind of implementation of the present embodiment, first judging unit 302, comprising:
Subelement is decrypted, for being decrypted, being decrypted to the check information using the decruption key obtained in advance As a result;
Contrast subunit, for comparing the decrypted result with the identification information obtained in advance;
First determines subelement, if identical as the identification information for the decrypted result, it is determined that in the product It deposits and belongs to legal memory;If the decrypted result is different from the identification information, it is determined that it is legal that the product memory is not belonging to Memory.
In a kind of implementation of the present embodiment, the second judgment unit 304, comprising:
Second determines subelement, if the depositing beyond the product memory of the memory headroom for limiting in the configuration data Store up space, it is determined that the configuration data and the memory headroom of the product memory do not match that;If being limited in the configuration data Memory space of the fixed memory headroom without departing from the product memory, it is determined that the configuration data is interior with the product memory Space is deposited to match.
As seen through the above description of the embodiments, those skilled in the art can be understood that above-mentioned implementation All or part of the steps in example method can be realized by means of software and necessary general hardware platform.Based on such Understand, substantially the part that contributes to existing technology can be in the form of software products in other words for the technical solution of the application It embodies, which can store in storage medium, such as ROM/RAM, magnetic disk, CD, including several Instruction is used so that a computer equipment (can be the network communications such as personal computer, server, or Media Gateway Equipment, etc.) execute method described in certain parts of each embodiment of the application or embodiment.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment emphasis is said Bright is the difference from other embodiments, and the same or similar parts in each embodiment may refer to each other.For reality For applying device disclosed in example, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place Referring to method part illustration.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of take-effective method of hardware configuration characterized by comprising
Read product check information stored in memory;
Judge whether the product memory belongs to legal memory according to the check information;
If the product memory belongs to legal memory, the configuration data of the product memory is generated;
Judge whether the configuration data and the memory headroom of the product memory match;
If the configuration data and the memory headroom of the product memory match, the configuration data is made to come into force.
2. the method according to claim 1, wherein if the product memory belongs to legal memory, the school Testing information is obtained after being encrypted the identification information of the product memory.
3. according to the method described in claim 2, it is characterized in that, the identification information is the product serial of the product memory The combined information that number SN or SN and other information are formed.
4. according to the method described in claim 2, it is characterized in that, described judge the product memory according to the check information Whether legal memory is belonged to, comprising:
Using the decruption key obtained in advance, the check information is decrypted, decrypted result is obtained;
The decrypted result is compared with the identification information obtained in advance;
If the decrypted result is identical as the identification information, it is determined that the product memory belongs to legal memory;If the solution Close result is different from the identification information, it is determined that the product memory is not belonging to legal memory.
5. method according to any one of claims 1 to 4, which is characterized in that the judgement configuration data with it is described Whether the memory headroom of product memory matches, comprising:
If the memory headroom limited in the configuration data exceeds the memory space of the product memory, it is determined that the configuration number It is not matched that according to the memory headroom with the product memory;
If the memory headroom limited in the configuration data is without departing from the memory space of the product memory, it is determined that the configuration Data and the memory headroom of the product memory match.
6. a kind of device that comes into force of hardware configuration characterized by comprising
Reading unit, for reading product check information stored in memory;
First judging unit, for judging whether the product memory belongs to legal memory according to the check information;
Generation unit generates the configuration data of the product memory if belonging to legal memory for the product memory;
Second judgment unit, for judging whether the configuration data and the memory headroom of the product memory match;
Validation unit makes the configuration number if matching for the configuration data and the memory headroom of the product memory According to coming into force.
7. device according to claim 6, which is characterized in that if the product memory belongs to legal memory, the school Testing information is obtained after being encrypted the identification information of the product memory.
8. device according to claim 7, which is characterized in that the identification information is the product serial of the product memory The combined information that number SN or SN and other information are formed.
9. device according to claim 7, which is characterized in that first judging unit, comprising:
Subelement is decrypted, for using the decruption key obtained in advance, the check information to be decrypted, obtains decryption knot Fruit;
Contrast subunit, for comparing the decrypted result with the identification information obtained in advance;
First determines subelement, if identical as the identification information for the decrypted result, it is determined that the product memory category In legal memory;If the decrypted result is different from the identification information, it is determined that the product memory is not belonging to legal memory.
10. according to the described in any item devices of claim 6 to 9, which is characterized in that the second judgment unit, comprising:
Second determines subelement, if storage of the memory headroom for limiting in the configuration data beyond the product memory is empty Between, it is determined that the configuration data and the memory headroom of the product memory do not match that;If being limited in the configuration data Memory space of the memory headroom without departing from the product memory, it is determined that the memory of the configuration data and the product memory is empty Between match.
CN201811354078.8A 2018-11-14 2018-11-14 Hardware configuration validation method and device Active CN109471810B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811354078.8A CN109471810B (en) 2018-11-14 2018-11-14 Hardware configuration validation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811354078.8A CN109471810B (en) 2018-11-14 2018-11-14 Hardware configuration validation method and device

Publications (2)

Publication Number Publication Date
CN109471810A true CN109471810A (en) 2019-03-15
CN109471810B CN109471810B (en) 2021-10-29

Family

ID=65672790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811354078.8A Active CN109471810B (en) 2018-11-14 2018-11-14 Hardware configuration validation method and device

Country Status (1)

Country Link
CN (1) CN109471810B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112557714A (en) * 2020-12-10 2021-03-26 宁波迦南智能电气股份有限公司 Multi-core modular intelligent electric energy meter

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156414A1 (en) * 2002-12-30 2006-07-13 Wenying You Increasing the extendibility of disk copy protection
US20080270677A1 (en) * 2003-06-30 2008-10-30 Mikolaj Kolakowski Safe software revision for embedded systems
CN105320606A (en) * 2014-07-30 2016-02-10 财团法人工业技术研究院 Data object management method and data object management system
CN106598887A (en) * 2016-12-05 2017-04-26 北京小米移动软件有限公司 DDR memory configuration method and device as well as electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156414A1 (en) * 2002-12-30 2006-07-13 Wenying You Increasing the extendibility of disk copy protection
US20080270677A1 (en) * 2003-06-30 2008-10-30 Mikolaj Kolakowski Safe software revision for embedded systems
CN105320606A (en) * 2014-07-30 2016-02-10 财团法人工业技术研究院 Data object management method and data object management system
CN106598887A (en) * 2016-12-05 2017-04-26 北京小米移动软件有限公司 DDR memory configuration method and device as well as electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112557714A (en) * 2020-12-10 2021-03-26 宁波迦南智能电气股份有限公司 Multi-core modular intelligent electric energy meter

Also Published As

Publication number Publication date
CN109471810B (en) 2021-10-29

Similar Documents

Publication Publication Date Title
US11523153B2 (en) System and techniques for digital data lineage verification
US7854010B2 (en) Method and apparatus for searching rights object and mapping method and mapping apparatus for the same
US8413130B2 (en) System and method for self policing of authorized configuration by end points
CN100550780C (en) The method of Control Software edition upgrading, equipment and system
US7181628B2 (en) Information terminal device and content backup method
US8321352B1 (en) Fingerprinting for software license inventory management
CN102236750A (en) Right control method and device for cloud computing system
CN105760184A (en) Method and device for loading component
CN110278264B (en) Block chain-based cross-link communication method and device and transaction system
WO2017101642A1 (en) Method and apparatus for upgrading data node of distributed system
CN110263545A (en) A kind of start-up course integrity measurement detection method based on android system
CN105631361A (en) Application program channel source identification method and device
CN107977223A (en) One kind configuration compliance check method and device
CN106406939A (en) EMMC chip-based mobile terminal rollback prevention method and system
US20110264991A1 (en) Method and System for Management of Electronic Mail Communication
CN103455750B (en) The high peace verification method of a kind of embedded device and device
CN109471810A (en) A kind of take-effective method and device of hardware configuration
CN107766699A (en) A kind of authorized appropriation method and apparatus
US20090150882A1 (en) System and method for software application installation
CN110879900B (en) Data processing method and device based on block chain system
CN106055372A (en) Method and device for uninstalling application
CN107861751A (en) The amending method and device of configuration file
CN102609650A (en) System and method for realizing software encrypting and downloading in electronic equipment
CN111131474A (en) Method, device and medium for managing user protocol based on block chain
CN105867938A (en) Method and device for identifying fingerprint modules

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant