CN109471810A - A kind of take-effective method and device of hardware configuration - Google Patents
A kind of take-effective method and device of hardware configuration Download PDFInfo
- Publication number
- CN109471810A CN109471810A CN201811354078.8A CN201811354078A CN109471810A CN 109471810 A CN109471810 A CN 109471810A CN 201811354078 A CN201811354078 A CN 201811354078A CN 109471810 A CN109471810 A CN 109471810A
- Authority
- CN
- China
- Prior art keywords
- memory
- product
- configuration data
- legal
- headroom
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/0223—User address space allocation, e.g. contiguous or non contiguous base addressing
- G06F12/023—Free address space management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of take-effective method of hardware configuration and devices, this method comprises: reading product check information stored in memory;Judge whether the product memory belongs to legal memory according to the check information;If the product memory belongs to legal memory, the configuration data of the product memory is generated;Judge whether the configuration data and the memory headroom of the product memory match;If the configuration data and the memory headroom of the product memory match, the configuration data is made to come into force.It can be seen that, this method is by determining that product memory belongs to legal memory and determines that configuration data and the memory headroom of product memory match, to guarantee that product memory is the requirement product of user, and, coming into force for hardware configuration is completed during carrying out hardware configuration upgrading, improves the efficiency of product up-gradation.
Description
Technical field
This application involves the take-effective methods and device of field of computer technology more particularly to a kind of hardware configuration.
Background technique
During research and development of products, it is often necessary to be defined to the configuration of hardware, so that software is in the hardware of restriction
Configuration is lower to be used.But user proposes to upgrade the product bought sometimes, due to before during using product
The hardware of the product is defined, so software section is also required to change configuration data, the process after HardwareUpgring
As hardware configuration upgrades.
In order to facilitate hardware configuration upgrading, software upgrade package service can be used, that is, user need to only buy upgrade package, will
Upgrade package is placed under the particular file folder of product systems, and restarting system can be completed hardware configuration upgrading.Hardware configuration upgrading one
As be memory upgrade, at this moment may relate to redistributing to memory, under different memory configurations, software service (i.e. network industry
Business or local service) difference is also had, so may also relate to the starting of certain services, and therefore, after having upgraded hardware configuration,
It during system reboot, needs to redistribute memory (including to the service having been started up before upgrading and new starting
Service carry out Memory Allocation), this process is known as coming into force for hardware configuration, and therefore, how the legal effectively hardware that comes into force is matched
It sets, is current problem to be solved.
Summary of the invention
The main purpose of the embodiment of the present application is to provide the take-effective method and device of a kind of hardware configuration, legal can have
The hardware configuration that comes into force of effect.
A kind of take-effective method of hardware configuration provided by the embodiments of the present application, comprising:
Read product check information stored in memory;
Judge whether the product memory belongs to legal memory according to the check information;
If the product memory belongs to legal memory, the configuration data of the product memory is generated;
Judge whether the configuration data and the memory headroom of the product memory match;
If the configuration data and the memory headroom of the product memory match, the configuration data is made to come into force.
Optionally, if the product memory belongs to legal memory, the check information is by the mark of the product memory
What knowledge information obtained after being encrypted.
Optionally, the identification information is that the product ID SN or the SN of the product memory are formed with other information
Combined information.
It is optionally, described to judge whether the product memory belongs to legal memory according to the check information, comprising:
Using the decruption key obtained in advance, the check information is decrypted, decrypted result is obtained;
The decrypted result is compared with the identification information obtained in advance;
If the decrypted result is identical as the identification information, it is determined that the product memory belongs to legal memory;If institute
It is different from the identification information to state decrypted result, it is determined that the product memory is not belonging to legal memory.
It is optionally, described to judge whether the configuration data and the memory headroom of the product memory match, comprising:
If the memory headroom limited in the configuration data exceeds the memory space of the product memory, it is determined that described to match
It sets data and the memory headroom of the product memory does not match that;
If the memory headroom limited in the configuration data is without departing from the memory space of the product memory, it is determined that described
Configuration data and the memory headroom of the product memory match.
A kind of device that comes into force of hardware configuration provided by the embodiments of the present application, comprising:
Reading unit, for reading product check information stored in memory;
First judging unit, for judging whether the product memory belongs to legal memory according to the check information;
Generation unit generates the configuration data of the product memory if belonging to legal memory for the product memory;
Second judgment unit, for judging whether the configuration data and the memory headroom of the product memory match;
Validation unit makes described match if matching for the configuration data and the memory headroom of the product memory
Data are set to come into force.
Optionally, if the product memory belongs to legal memory, the check information is by the mark of the product memory
What knowledge information obtained after being encrypted.
Optionally, the identification information is that the product ID SN or the SN of the product memory are formed with other information
Combined information.
Optionally, first judging unit, comprising:
Subelement is decrypted, for being decrypted, being decrypted to the check information using the decruption key obtained in advance
As a result;
Contrast subunit, for comparing the decrypted result with the identification information obtained in advance;
First determines subelement, if identical as the identification information for the decrypted result, it is determined that in the product
It deposits and belongs to legal memory;If the decrypted result is different from the identification information, it is determined that it is legal that the product memory is not belonging to
Memory.
Optionally, the second judgment unit, comprising:
Second determines subelement, if the depositing beyond the product memory of the memory headroom for limiting in the configuration data
Store up space, it is determined that the configuration data and the memory headroom of the product memory do not match that;If being limited in the configuration data
Memory space of the fixed memory headroom without departing from the product memory, it is determined that the configuration data is interior with the product memory
Space is deposited to match.
It can be seen that the embodiment of the present application has the following beneficial effects:
The take-effective method and device of hardware configuration provided by the embodiments of the present application, by reading product school stored in memory
Test information;Judge whether the product memory belongs to legal memory according to the check information;If the product memory belongs to conjunction
Method memory then generates the configuration data of the product memory;Judge the memory headroom of the configuration data Yu the product memory
Whether match;If the configuration data and the memory headroom of the product memory match, the configuration data is made to come into force.
As it can be seen that method provided by the present application is by determining that product memory belongs to legal memory and determine configuration data and product memory
Memory headroom matches, to guarantee that product memory is the requirement product of user, and, during carrying out hardware configuration upgrading
Coming into force for hardware configuration is completed, the efficiency of product up-gradation is improved.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the application
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is a kind of take-effective method flow chart of hardware configuration provided by the embodiments of the present application;
Fig. 2 is provided by the embodiments of the present application a kind of to judge whether product memory belongs to legal memory according to check information
Method flow diagram;
Fig. 3 is a kind of composition schematic diagram of the device that comes into force of hardware configuration provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
The embodiment of the present application can be applied in the scene upgraded to product.
When user is during using product, the product bought is upgraded sometimes, such as: user would generally
Some storage chips are added into product to promote the memory of product, or the section components in product can also be replaced and be become second nature
It can more preferably component etc..The process is the escalation process of hardware.And due to being defined before to the hardware of the product,
So software section is also required to change configuration data after HardwareUpgring, which is hardware configuration upgrading.
In the prior art, usually after having upgraded hardware configuration, during system reboot, memory is divided again
Match, this process is known as coming into force for hardware configuration.In this way, reducing the efficiency of product up-gradation process.
Based on the problems of the prior art, the embodiment of the present application provides a kind of take-effective method of hardware configuration, to solve
The problems of the prior art.
It, can be with the figure shows a kind of take-effective method flow chart of hardware configuration provided by the embodiments of the present application referring to Fig. 1
Including step S101-S105:
S101: product check information stored in memory is read.
In specific application scenarios, user is usually that the portions such as storage chip are added into product to the upgrading of products-hardware
The components such as these storage chips then can be known as product memory to promote the memory of product by part.
In the present embodiment, it can be all previously stored in product memory for examining the product memory whether legal
Check information, and can store different check informations in different product memories.Wherein, check information such as can be pre-
The license passport (license) being first stored in product memory.In this way, being added in system by software upgrade package to hardware
When carrying out configuration upgrading, pre-stored check information in upgrading products memory can be read first.
S102: judge whether the product memory belongs to legal memory according to check information.
In the present embodiment, it after reading product check information stored in memory, can be read according to this
Check information judges whether product memory belongs to legal memory.
In a kind of implementation of the present embodiment, referring to fig. 2, the figure shows a kind of provided by the embodiments of the present application
Judge whether product memory belongs to the method flow diagram of legal memory according to check information, may include step S201-S203:
S201: using the decruption key obtained in advance, the check information is decrypted, decrypted result is obtained.
In the present embodiment, check information can be the information encrypted by encryption key, upgrade in hardware configuration
During, the decruption key for check information to be decrypted can be got in advance, using the decruption key to verification
Information is decrypted, and obtains decrypted result.
S202: decrypted result is compared with the identification information obtained in advance.
In the present embodiment, the identification information of the storage product can be obtained in advance, and check information will be decrypted
Decrypted result compared with the identification information obtained in advance, to judge whether the product memory belongs to legal memory.
S203: if the decrypted result is identical as the identification information, it is determined that the product memory belongs to legal memory;
If the decrypted result is different from the identification information, it is determined that the product memory is not belonging to legal memory.
In the present embodiment, it is to be understood that after passing through judgement, if decrypted result is identical as identification information,
It can then determine that the product memory belongs to legal memory;If decrypted result is different from identification information, the product can be determined
Memory is not belonging to legal memory.
S103: if the product memory belongs to legal memory, the configuration data of the product memory is generated.
In the present embodiment, if the product can be generated by judging to determine that the product memory belongs to legal memory
The configuration data of memory.Wherein, configuration data can be the number that software upgrade package carries out configuration restriction to the product memory of addition
According to so that software uses in the product memory of the addition.
In a kind of implementation of the present embodiment, if product memory belongs to legal memory, check information is by product
What the identification information of memory obtained after being encrypted.
In the present embodiment, can in advance to legal product memory, by the identification information of product memory encrypt into
And check information is obtained, and the checking information is stored into legal product memory.Wherein, identification information can be with accordingly
Product memory is relevant and product ID (Serial with the one-to-one information of product memory, such as product memory
Number, SN), Part No. (part Number, PN).Therefore, judging that product memory belongs to according to the check information got
When legal, which obtained after being encrypted the identification information of product memory.
In a kind of implementation of the present embodiment, identification information be product memory product ID SN or SN with it is other
The combined information that information is formed.
In the present embodiment, identification information can be the product ID SN of product memory, or by SN and other letters
Cease the combined information formed.Such as: it can be using the combined information of the SN of product memory and PN as the product sequence of the product memory
Row number.
S104: judge whether the configuration data and the memory headroom of the product memory match.
In the present embodiment, after saving as legal memory in the product added by determining, judgement is also needed in step s 102
Whether the configuration data of generation and the memory headroom of the product memory match, to determine that the product memory and software upgrade package are raw
The configuration data of production matches.
In a kind of implementation of the present embodiment, judge whether configuration data and the memory headroom of product memory match
Method include:
If the memory headroom limited in configuration data exceeds the memory space of product memory, it is determined that configuration data and product
The memory headroom of memory does not match that;
If the memory headroom limited in configuration data is without departing from the memory space of product memory, it is determined that configuration data and production
The memory headroom of product memory matches.
In the present embodiment, the method for judging whether the memory headroom of configuration data and product memory matches may is that
If the memory headroom limited in configuration data exceeds the memory space of product memory itself, it can determine configuration data and be somebody's turn to do
The memory headroom of product memory does not match that.Such as: the memory headroom limited in configuration data is 10G, and the product memory
Memory space is 8G, then the memory headroom limited in configuration data has exceeded the memory space of the product memory, therefore can be true
Determine configuration data and the memory headroom of the product memory does not match that.If the memory headroom limited in configuration data is without departing from production
The memory space of product memory itself can then determine that configuration data and the memory headroom of the product memory match.Such as: configuration
The memory headroom limited in data is 8G, and the memory space of the product memory is 10G, then the memory limited in configuration data is empty
Between without departing from the product memory memory space, thus may determine that the memory headroom of configuration data and the product memory not phase
Match.
S105: if the configuration data and the memory headroom of the product memory match, keep the configuration data raw
Effect.
In the present embodiment, after determining whether the memory headroom of configuration data and the product memory matches, then may be used
The service thinking the service having been turned on before upgrading and newly starting carries out redistributing for memory, that is, carries out coming into force for configuration data.
To sum up, the take-effective method and device of hardware configuration provided by the embodiments of the present application is deposited by reading in product memory
The check information of storage;Judge whether the product memory belongs to legal memory according to the check information;If the product memory
Belong to legal memory, then generates the configuration data of the product memory;Judge the interior of the configuration data and the product memory
Deposit whether space matches;If the configuration data and the memory headroom of the product memory match, make the configuration number
According to coming into force.As it can be seen that method provided by the present application by determine product memory belong to legal memory and determine configuration data and produce
The memory headroom of product memory matches, to guarantee that product memory is the requirement product of user, and, carrying out hardware configuration upgrading
During i.e. complete coming into force for hardware configuration, improve the efficiency of product up-gradation.
Referring to Fig. 3, the figure shows a kind of composition signals of the device that comes into force of hardware configuration provided by the embodiments of the present application
Figure, comprising:
Reading unit 301, for reading product check information stored in memory;
First judging unit 302, for judging whether the product memory belongs to legal memory according to the check information;
Generation unit 303 generates the configuration number of the product memory if belonging to legal memory for the product memory
According to;
Second judgment unit 304, for judge the configuration data and the product memory memory headroom whether phase
Match;
Validation unit 305 makes described if matching for the configuration data and the memory headroom of the product memory
Configuration data comes into force.
In a kind of implementation of the present embodiment, if the product memory belongs to legal memory, the check information
It is to be obtained after being encrypted the identification information of the product memory.
In a kind of implementation of the present embodiment, the identification information be the product memory product ID SN or
The combined information that the SN and other information are formed.
In a kind of implementation of the present embodiment, first judging unit 302, comprising:
Subelement is decrypted, for being decrypted, being decrypted to the check information using the decruption key obtained in advance
As a result;
Contrast subunit, for comparing the decrypted result with the identification information obtained in advance;
First determines subelement, if identical as the identification information for the decrypted result, it is determined that in the product
It deposits and belongs to legal memory;If the decrypted result is different from the identification information, it is determined that it is legal that the product memory is not belonging to
Memory.
In a kind of implementation of the present embodiment, the second judgment unit 304, comprising:
Second determines subelement, if the depositing beyond the product memory of the memory headroom for limiting in the configuration data
Store up space, it is determined that the configuration data and the memory headroom of the product memory do not match that;If being limited in the configuration data
Memory space of the fixed memory headroom without departing from the product memory, it is determined that the configuration data is interior with the product memory
Space is deposited to match.
As seen through the above description of the embodiments, those skilled in the art can be understood that above-mentioned implementation
All or part of the steps in example method can be realized by means of software and necessary general hardware platform.Based on such
Understand, substantially the part that contributes to existing technology can be in the form of software products in other words for the technical solution of the application
It embodies, which can store in storage medium, such as ROM/RAM, magnetic disk, CD, including several
Instruction is used so that a computer equipment (can be the network communications such as personal computer, server, or Media Gateway
Equipment, etc.) execute method described in certain parts of each embodiment of the application or embodiment.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment emphasis is said
Bright is the difference from other embodiments, and the same or similar parts in each embodiment may refer to each other.For reality
For applying device disclosed in example, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place
Referring to method part illustration.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one
Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation
There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain
Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of take-effective method of hardware configuration characterized by comprising
Read product check information stored in memory;
Judge whether the product memory belongs to legal memory according to the check information;
If the product memory belongs to legal memory, the configuration data of the product memory is generated;
Judge whether the configuration data and the memory headroom of the product memory match;
If the configuration data and the memory headroom of the product memory match, the configuration data is made to come into force.
2. the method according to claim 1, wherein if the product memory belongs to legal memory, the school
Testing information is obtained after being encrypted the identification information of the product memory.
3. according to the method described in claim 2, it is characterized in that, the identification information is the product serial of the product memory
The combined information that number SN or SN and other information are formed.
4. according to the method described in claim 2, it is characterized in that, described judge the product memory according to the check information
Whether legal memory is belonged to, comprising:
Using the decruption key obtained in advance, the check information is decrypted, decrypted result is obtained;
The decrypted result is compared with the identification information obtained in advance;
If the decrypted result is identical as the identification information, it is determined that the product memory belongs to legal memory;If the solution
Close result is different from the identification information, it is determined that the product memory is not belonging to legal memory.
5. method according to any one of claims 1 to 4, which is characterized in that the judgement configuration data with it is described
Whether the memory headroom of product memory matches, comprising:
If the memory headroom limited in the configuration data exceeds the memory space of the product memory, it is determined that the configuration number
It is not matched that according to the memory headroom with the product memory;
If the memory headroom limited in the configuration data is without departing from the memory space of the product memory, it is determined that the configuration
Data and the memory headroom of the product memory match.
6. a kind of device that comes into force of hardware configuration characterized by comprising
Reading unit, for reading product check information stored in memory;
First judging unit, for judging whether the product memory belongs to legal memory according to the check information;
Generation unit generates the configuration data of the product memory if belonging to legal memory for the product memory;
Second judgment unit, for judging whether the configuration data and the memory headroom of the product memory match;
Validation unit makes the configuration number if matching for the configuration data and the memory headroom of the product memory
According to coming into force.
7. device according to claim 6, which is characterized in that if the product memory belongs to legal memory, the school
Testing information is obtained after being encrypted the identification information of the product memory.
8. device according to claim 7, which is characterized in that the identification information is the product serial of the product memory
The combined information that number SN or SN and other information are formed.
9. device according to claim 7, which is characterized in that first judging unit, comprising:
Subelement is decrypted, for using the decruption key obtained in advance, the check information to be decrypted, obtains decryption knot
Fruit;
Contrast subunit, for comparing the decrypted result with the identification information obtained in advance;
First determines subelement, if identical as the identification information for the decrypted result, it is determined that the product memory category
In legal memory;If the decrypted result is different from the identification information, it is determined that the product memory is not belonging to legal memory.
10. according to the described in any item devices of claim 6 to 9, which is characterized in that the second judgment unit, comprising:
Second determines subelement, if storage of the memory headroom for limiting in the configuration data beyond the product memory is empty
Between, it is determined that the configuration data and the memory headroom of the product memory do not match that;If being limited in the configuration data
Memory space of the memory headroom without departing from the product memory, it is determined that the memory of the configuration data and the product memory is empty
Between match.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811354078.8A CN109471810B (en) | 2018-11-14 | 2018-11-14 | Hardware configuration validation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811354078.8A CN109471810B (en) | 2018-11-14 | 2018-11-14 | Hardware configuration validation method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109471810A true CN109471810A (en) | 2019-03-15 |
CN109471810B CN109471810B (en) | 2021-10-29 |
Family
ID=65672790
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811354078.8A Active CN109471810B (en) | 2018-11-14 | 2018-11-14 | Hardware configuration validation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109471810B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112557714A (en) * | 2020-12-10 | 2021-03-26 | 宁波迦南智能电气股份有限公司 | Multi-core modular intelligent electric energy meter |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060156414A1 (en) * | 2002-12-30 | 2006-07-13 | Wenying You | Increasing the extendibility of disk copy protection |
US20080270677A1 (en) * | 2003-06-30 | 2008-10-30 | Mikolaj Kolakowski | Safe software revision for embedded systems |
CN105320606A (en) * | 2014-07-30 | 2016-02-10 | 财团法人工业技术研究院 | Data object management method and data object management system |
CN106598887A (en) * | 2016-12-05 | 2017-04-26 | 北京小米移动软件有限公司 | DDR memory configuration method and device as well as electronic equipment |
-
2018
- 2018-11-14 CN CN201811354078.8A patent/CN109471810B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060156414A1 (en) * | 2002-12-30 | 2006-07-13 | Wenying You | Increasing the extendibility of disk copy protection |
US20080270677A1 (en) * | 2003-06-30 | 2008-10-30 | Mikolaj Kolakowski | Safe software revision for embedded systems |
CN105320606A (en) * | 2014-07-30 | 2016-02-10 | 财团法人工业技术研究院 | Data object management method and data object management system |
CN106598887A (en) * | 2016-12-05 | 2017-04-26 | 北京小米移动软件有限公司 | DDR memory configuration method and device as well as electronic equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112557714A (en) * | 2020-12-10 | 2021-03-26 | 宁波迦南智能电气股份有限公司 | Multi-core modular intelligent electric energy meter |
Also Published As
Publication number | Publication date |
---|---|
CN109471810B (en) | 2021-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11523153B2 (en) | System and techniques for digital data lineage verification | |
US7854010B2 (en) | Method and apparatus for searching rights object and mapping method and mapping apparatus for the same | |
US8413130B2 (en) | System and method for self policing of authorized configuration by end points | |
CN100550780C (en) | The method of Control Software edition upgrading, equipment and system | |
US7181628B2 (en) | Information terminal device and content backup method | |
US8321352B1 (en) | Fingerprinting for software license inventory management | |
CN102236750A (en) | Right control method and device for cloud computing system | |
CN105760184A (en) | Method and device for loading component | |
CN110278264B (en) | Block chain-based cross-link communication method and device and transaction system | |
WO2017101642A1 (en) | Method and apparatus for upgrading data node of distributed system | |
CN110263545A (en) | A kind of start-up course integrity measurement detection method based on android system | |
CN105631361A (en) | Application program channel source identification method and device | |
CN107977223A (en) | One kind configuration compliance check method and device | |
CN106406939A (en) | EMMC chip-based mobile terminal rollback prevention method and system | |
US20110264991A1 (en) | Method and System for Management of Electronic Mail Communication | |
CN103455750B (en) | The high peace verification method of a kind of embedded device and device | |
CN109471810A (en) | A kind of take-effective method and device of hardware configuration | |
CN107766699A (en) | A kind of authorized appropriation method and apparatus | |
US20090150882A1 (en) | System and method for software application installation | |
CN110879900B (en) | Data processing method and device based on block chain system | |
CN106055372A (en) | Method and device for uninstalling application | |
CN107861751A (en) | The amending method and device of configuration file | |
CN102609650A (en) | System and method for realizing software encrypting and downloading in electronic equipment | |
CN111131474A (en) | Method, device and medium for managing user protocol based on block chain | |
CN105867938A (en) | Method and device for identifying fingerprint modules |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |