CN109495491A - Information collecting method and system - Google Patents

Information collecting method and system Download PDF

Info

Publication number
CN109495491A
CN109495491A CN201811480687.8A CN201811480687A CN109495491A CN 109495491 A CN109495491 A CN 109495491A CN 201811480687 A CN201811480687 A CN 201811480687A CN 109495491 A CN109495491 A CN 109495491A
Authority
CN
China
Prior art keywords
terminal device
server
information
verification information
data acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811480687.8A
Other languages
Chinese (zh)
Inventor
周元钉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Seclover Information Technology Co Ltd
Original Assignee
Xi'an Seclover Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Seclover Information Technology Co Ltd filed Critical Xi'an Seclover Information Technology Co Ltd
Priority to CN201811480687.8A priority Critical patent/CN109495491A/en
Publication of CN109495491A publication Critical patent/CN109495491A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/302Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Evolutionary Computation (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure provides a kind of information collecting method and system, is related to information technology field, is able to solve the problem of can not acquiring forensic information.The specific technical proposal is: terminal device sends implantation request to server, the implantation request is for requesting implant data capture program;The server sends the data acquisition program to the terminal device;The installing terminal equipment simultaneously runs the data acquisition program, and Xiang Suoshu server sends the collected information of the data acquisition program institute.The disclosure is for acquiring investigation and evidence collection information.

Description

Information collecting method and system
Technical field
This disclosure relates to information technology field more particularly to information collecting method and system.
Background technique
With the high speed development of mobile Internet, the appearance of smart phone gives many-sided all bands such as people's lives, work Carry out great convenience, but the case that offender carries out high-tech crime using smart phone simultaneously is more and more, therefore For public security department, acquiring evident information out of smart phone becomes important evidence obtaining approach.
In the related technology, it needs to be implanted into data acquisition program toward smart phone under USB debugging mode.However, at present Smart phone more and more limitations are provided with to starting USB debugging mode, such as need to input the verification information of owner It can starting.The information in smart phone can not be just collected when USB debugging mode can not be started, and influence to investigate and collect evidence.
Summary of the invention
The embodiment of the present disclosure provides a kind of information collecting method and system, and asking for forensic information can not be acquired by being able to solve Topic.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of information collecting method is provided, this method comprises:
Terminal device sends implantation request to server, and the implantation request is for requesting implant data capture program;
The server sends the data acquisition program to the terminal device;
The installing terminal equipment simultaneously runs the data acquisition program, and Xiang Suoshu server sends the data and acquires journey The collected information of sequence institute.
Technical solution provided by the present disclosure, terminal device send implantation request to server, and server is returned to terminal device Data acquisition program, installing terminal equipment and operation data capture program are returned, the collected information of institute is sent to server, completes Forensic information acquisition.Terminal device receives data acquisition program from server, in the case where USB debugging mode can not be started, Also can implant data capture program, complete the acquisition of forensic information.
In one embodiment, the terminal device sends implantation request to server, comprising:
Terminal device identification target two dimensional code obtains the access address of the server, according to the access address to The server sends implantation request.
Terminal device can trigger implantation request by way of identifying two dimensional code, simple and quick.
In one embodiment, it before the server sends the data acquisition program to the terminal device, also wraps It includes:
The server receives the verification information that the terminal device is sent, and the verification information includes the terminal device Equipment identification information, the identification information investigated case, the identity identification information of personnel of collecting evidence, personnel concerning the case identification letter At least one of breath;
Determine that the verification information received from the terminal device matches with pre-stored verification information.
The verification information that server authentication terminal device is sent sends data to terminal device again after being verified and acquires journey Sequence prevents data acquisition program to be illegally used.
In one embodiment, it before the server sends the data acquisition program to the terminal device, also wraps It includes:
The server sends the first verification information to the security terminal by certification;
Receive the second verification information that the terminal device is sent;
Determine that first verification information and second verification information match.
Server sends the first verification information to security terminal, and receives and the terminal device for carrying out information collection is needed to be sent out The second verification information sent sends number when determining that the first verification information and the second verification information match, then to terminal device According to capture program, guarantee that the evidence obtaining personnel for holding security terminal just can prevent from counting to terminal device implant data capture program It is illegally used according to capture program.
In one embodiment, before the terminal device operation data acquisition program, further includes:
The terminal device sends operation request to the server, and the operation request includes the mark of the terminal device Know information;
The server determines the terminal device in pre-stored white list according to the identification information of the terminal device When interior, Xiang Suoshu terminal device sends operation authorization instruction.
Server is pre-stored white list, and the terminal device in the white list can just operate normally data acquisition program, Prevent the equipment misuse or illegal Usage data collection program except white list.
According to the second aspect of an embodiment of the present disclosure, a kind of information acquisition system, including terminal device and server are provided;
The terminal device, for sending implantation request to the server, the implantation request is for requesting implantation number According to capture program;
The server, for sending the data acquisition program to the terminal device;
The terminal device, for installing and running the data acquisition program, Xiang Suoshu server sends the data The collected information of capture program institute.
In one embodiment, the terminal device, target two dimensional code obtains the access of the server for identification Location sends implantation request to the server according to the access address.
In one embodiment, the terminal device, for sending verification information, the verification information to the server Equipment identification information including the terminal device, the identification information investigated case, the personnel that collect evidence identity identification information, case-involving At least one of identity identification information of personnel;
The server, verification information and pre-stored verification information for determining to receive from the terminal device Match.
In one embodiment, information acquisition system further includes the security terminal by certification;
The server, for sending the first verification information to the security terminal;
The terminal device, for sending the second verification information to the server;
The server, for determining that first verification information and second verification information match.
In one embodiment, the terminal device, for sending operation request, the operation request to the server Identification information including the terminal device;
The server, for determining the terminal device pre-stored according to the identification information of the terminal device When in white list, Xiang Suoshu terminal device sends operation authorization instruction.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart for information collecting method that the embodiment of the present disclosure provides;
Fig. 2 is a kind of flow chart for information collecting method that the embodiment of the present disclosure provides;
Fig. 3 is a kind of operation interface schematic diagram for terminal device that the embodiment of the present disclosure provides;
Fig. 4 is a kind of structure chart for information acquisition system that the embodiment of the present disclosure provides.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
In the related technology, it needs to be implanted into data acquisition program toward smart phone under USB debugging mode.If cannot open Dynamic USB debugging mode, can not just collect the information in smart phone, influence to investigate and collect evidence.
Embodiment of the disclosure provides a kind of collecting method and system, in the case where not starting USB debugging mode, Also can implant data capture program, complete the acquisition of forensic information.As shown in Figure 1, the collecting method the following steps are included:
101, terminal device sends implantation request to server.
Terminal device includes but is not limited to the electronic equipments such as smart phone, tablet computer, PC.The implementation of the disclosure So-called terminal device in example, refers to the terminal device of evidence obtaining to be investigated.Implantation request is for requesting implant data capture program.
In one embodiment, investigation and evidence collection personnel can input the access of server into the browser of terminal device Location, triggering implantation request.
In one embodiment, terminal device identification target two dimensional code obtains the access address of server, according to access Location sends implantation request to server.
For example, terminal device can be scanned by camera target two dimensional code or terminal device by social software or Other application receives the picture of target two dimensional code, identifies the two dimensional code on the picture.
Target two dimensional code is pre-generated two dimensional code, the two dimensional code usually put on record by public security department.Target two dimension Code can carry the information such as access address or data acquisition program store path, such as may include right identification information.The permission It is the two dimensional code licensed by public security department that identification information, which may be used to indicate the two dimensional code, or instruction have using this two The personnel for tieing up code weight limit or unit etc..Terminal device triggers implantation request by way of identifying two dimensional code, without starting eventually The USB debugging mode of end equipment, it is simple and quick.
102, server sends data acquisition program to terminal device.
Server pre-saves data acquisition program, after receiving implantation request, can send data to terminal device and adopt Collect program.
103, it is collected to send data acquisition program institute to server for installing terminal equipment and operation data capture program Information.
After terminal device receives data acquisition program, installs and run the program.When data acquisition program is run, from end Information of the end equipment acquisition for investigation and evidence collection, is sent to server for collected information.
The embodiment of the present disclosure provide information collecting method, terminal device to server send implantation request, server to Terminal device returned data capture program, installing terminal equipment and operation data capture program are collected to server transmission Information, complete forensic information acquisition.Terminal device receives data acquisition program from server, is not starting USB debugging mode In the case where, also can implant data capture program, complete the acquisition of forensic information.
Based on the information collecting method that the corresponding embodiment of above-mentioned Fig. 1 provides, another embodiment of the disclosure is to information collection Method has done further supplementary explanation.The step in content embodiment corresponding with Fig. 1 in part of step is identical or class Seemingly, it only elaborates below to difference in step.
Referring to shown in Fig. 2, information collecting method provided in this embodiment the following steps are included:
201, terminal device sends implantation request to server.
Implantation request is for requesting implant data capture program.
202, server determines that terminal device is the terminal device for allowing installation data capture program.
Data acquisition program is used to acquire the information needed for investigating and collecting evidence, and is related to information security, to prevent data from acquiring journey Sequence is abused or illegally uses, it is therefore desirable to determine whether installing terminal equipment data acquisition program.When determining permission Just data acquisition program is sent to terminal device.
It is as follows that embodiment of the disclosure provides two kinds of exemplary illustrations, it is emphasized that following two example is only to show Example property explanation and it is non exhaustive.
Example one
After server receives the implantation request of terminal device transmission, server instruction terminal equipment provides verification information. Referring to the display interface schematic diagram of terminal device shown in Fig. 3, investigation and evidence collection personnel can be by verification information input terminal equipment, eventually Verification information is sent to server by end equipment.
Optionally, verification information may include the equipment identification information of terminal device, the identification information that investigates case, evidence obtaining people Identity identification information, at least one of the identity identification information of personnel concerning the case of member.
By taking terminal device is the situation of mobile phone as an example, equipment identification information includes but is not limited to the international mobile device of mobile phone Identification code (full name in English: International Mobile Equipment Identity, English abbreviation: IMEI), mobile phone vendor The information such as quotient, model, telephone number.
The identification information investigated case includes but is not limited to the letter that the public security departments such as investigated case docket put on record Breath.
The identity identification information of evidence obtaining personnel, the work number, identification card number etc. of including but not limited to investigation and evidence collection personnel are used for Identify the information of personnel identity.
The identity of personnel concerning the case is including but not limited to personnel's body for identification such as identification card number of respondent by information The information of part.
After server receives the verification information of terminal device transmission, determine that the verification information received from terminal device is It is no to match with pre-stored verification information.If so, triggering step 203, sends data acquisition program to terminal device.If It is no, then stop executing subsequent step.
The verification information that server authentication terminal device is sent sends data to terminal device again after being verified and acquires journey Sequence prevents data acquisition program to be illegally used.
Example two
After server receives the implantation request of terminal device transmission, server is tested to the security terminal transmission by certification Information is demonstrate,proved, and indicates that the terminal device (hereinafter referred to as terminal device) of evidence obtaining to be investigated provides verification information.
Investigation and evidence collection personnel can hold security terminal, the verification information input terminal equipment which is received, The verification information that investigation and evidence collection personnel input is sent to server by terminal device.
For purposes of illustration only, server is known as the first verification information to the verification information that security terminal is sent, by server The verification information received from terminal device is known as the second verification information.
Server sends the first verification information, the second verifying that receiving terminal apparatus is sent to the security terminal by certification Information, determines whether the first verification information matches with the second verification information.If so, triggering step 203, sends out to terminal device Send data acquisition program.If it is not, then stopping executing subsequent step.
Server is when determining that the first verification information and the second verification information match, then sends data to terminal device and adopt Collect program, guarantees that the evidence obtaining personnel for holding security terminal just can prevent data from adopting to terminal device implant data capture program Collection program is illegally used.
203, server sends data acquisition program to terminal device.
Server determines that terminal device is when allowing the terminal device of installation data capture program, to send to the terminal device Data acquisition program.
204, installing terminal equipment data acquisition program.
205, terminal device obtains the authorization instruction of operation data capture program to server.
After installing terminal equipment data acquisition program, data acquisition program can obtain the identification information of terminal device.It is anti- Only data acquisition program is illegally used, and data acquisition program starts Shi Kexiang server request operation data capture program Authorization instruction.
For example, terminal device sends operation request to server, operation request includes the identification information of terminal device.Service When device determines that terminal device is in pre-stored white list according to the identification information of terminal device, operation is sent to terminal device and is awarded Power instruction.
When terminal device receives operation authorization instruction, data acquisition program could be operated normally to acquire from terminal device and be used In the information of investigation and evidence collection.
Server is pre-stored white list, and the terminal device in the white list can just operate normally data acquisition program, Prevent the illegal Usage data collection program of the equipment except white list.
206, terminal device operation data capture program sends the collected information of data acquisition program institute to server.
After terminal device receives operation authorization instruction, data acquisition program brings into operation, and is used for from terminal device acquisition Collected information is sent to server by the information of investigation and evidence collection.
The embodiment of the present disclosure provide information collecting method, terminal device to server send implantation request, server to Terminal device returned data capture program, installing terminal equipment and operation data capture program are collected to server transmission Information, complete forensic information acquisition.Terminal device receives data acquisition program from server, can not start USB debugging mould In the case where formula, also can implant data capture program, complete the acquisition of forensic information.And pass through the safety before installation, before operation Verifying measure, prevents data acquisition program to be illegally used.
It is following for disclosure device reality based on information collecting method described in the corresponding embodiment of above-mentioned Fig. 1-Fig. 3 Example is applied, can be used for executing embodiments of the present disclosure.
The embodiment of the present disclosure provides a kind of information acquisition system, as shown in figure 4, information acquisition system includes terminal device 41 With server 42.
Terminal device 41, for sending implantation request to server 42, implantation request is for requesting implant data to acquire journey Sequence.
Server 42, for sending data acquisition program to terminal device 41.
Terminal device 41 sends data acquisition program to server 42 and is adopted for installing simultaneously operation data capture program The information collected.
In one embodiment, terminal device 41, target two dimensional code obtains the access address of server 42, root for identification Implantation request is sent to server 42 according to access address.
In one embodiment, terminal device 41, for sending verification information to server 42, verification information includes terminal The equipment identification information of equipment 41, the identification information investigated case, the identity identification information of personnel of collecting evidence, the identity of personnel concerning the case At least one of identification information.
Server 42, verification information and pre-stored verification information phase for determining to receive from terminal device 41 Match.
In one embodiment, information acquisition system further includes the security terminal 43 by certification.
Server 42, for sending the first verification information to security terminal 43.
Terminal device 41, for sending the second verification information to server 42.
Server 42, for determining that the first verification information and the second verification information match.
In one embodiment, terminal device 41, for sending operation request to server 42, operation request includes terminal The identification information of equipment 41.
Server 42, for determining terminal device 41 in pre-stored white list according to the identification information of terminal device 41 When interior, operation authorization instruction is sent to terminal device 41.
The embodiment of the present disclosure provide information acquisition system, terminal device to server send implantation request, server to Terminal device returned data capture program, installing terminal equipment and operation data capture program are collected to server transmission Information, complete forensic information acquisition.Terminal device receives data acquisition program from server, can not start USB debugging mould In the case where formula, also can implant data capture program, complete the acquisition of forensic information.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.

Claims (10)

1. a kind of information collecting method, which is characterized in that the described method includes:
Terminal device sends implantation request to server, and the implantation request is for requesting implant data capture program;
The server sends the data acquisition program to the terminal device;
The installing terminal equipment simultaneously runs the data acquisition program, and Xiang Suoshu server sends the data acquisition program institute Collected information.
2. the method according to claim 1, wherein the terminal device sends implantation request, packet to server It includes:
Terminal device identification target two dimensional code obtains the access address of the server, according to the access address to described Server sends implantation request.
3. the method according to claim 1, wherein the server sends the data to the terminal device Before capture program, further includes:
The server receives the verification information that the terminal device is sent, and the verification information includes setting for the terminal device For in identification information, the identification information investigated case, the identity identification information of personnel of collecting evidence, the identity identification information of personnel concerning the case At least one;
Determine that the verification information received from the terminal device matches with pre-stored verification information.
4. the method according to claim 1, wherein the server sends the data to the terminal device Before capture program, further includes:
The server sends the first verification information to the security terminal by certification;
Receive the second verification information that the terminal device is sent;
Determine that first verification information and second verification information match.
5. the method according to claim 1, wherein the terminal device run the data acquisition program it Before, further includes:
The terminal device sends operation request to the server, and the operation request includes that the mark of the terminal device is believed Breath;
When the server determines that the terminal device is in pre-stored white list according to the identification information of the terminal device, Operation authorization instruction is sent to the terminal device.
6. a kind of information acquisition system, which is characterized in that including terminal device to server;
The terminal device, for sending implantation request to the server, the implantation request is for requesting implant data to be adopted Collect program;
The server, for sending the data acquisition program to the terminal device;
The terminal device, for installing and running the data acquisition program, Xiang Suoshu server sends the data acquisition The collected information of program institute.
7. system according to claim 6, which is characterized in that
The terminal device, target two dimensional code obtains the access address of the server for identification, according to the access address Implantation request is sent to the server.
8. system according to claim 6, which is characterized in that
The terminal device, for sending verification information to the server, the verification information includes the terminal device Equipment identification information, the identification information investigated case, the identity identification information of personnel of collecting evidence, the identity identification information of personnel concerning the case At least one of;
The server, verification information and pre-stored verification information phase for determining to receive from the terminal device Match.
9. system according to claim 6, which is characterized in that further include the security terminal by certification;
The server, for sending the first verification information to the security terminal;
The terminal device, for sending the second verification information to the server;
The server, for determining that first verification information and second verification information match.
10. system according to claim 6, which is characterized in that
The terminal device, for sending operation request to the server, the operation request includes the terminal device Identification information;
The server, for determining the terminal device in pre-stored white name according to the identification information of the terminal device When in list, Xiang Suoshu terminal device sends operation authorization instruction.
CN201811480687.8A 2018-12-05 2018-12-05 Information collecting method and system Pending CN109495491A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811480687.8A CN109495491A (en) 2018-12-05 2018-12-05 Information collecting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811480687.8A CN109495491A (en) 2018-12-05 2018-12-05 Information collecting method and system

Publications (1)

Publication Number Publication Date
CN109495491A true CN109495491A (en) 2019-03-19

Family

ID=65698271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811480687.8A Pending CN109495491A (en) 2018-12-05 2018-12-05 Information collecting method and system

Country Status (1)

Country Link
CN (1) CN109495491A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102917059A (en) * 2012-10-19 2013-02-06 北京奇虎科技有限公司 Client end and method for downloading application
CN102981879A (en) * 2012-12-03 2013-03-20 中国联合网络通信集团有限公司 Supply method, acquisition method, equipment and processing system of application software installation package
CN103544409A (en) * 2012-07-11 2014-01-29 腾讯科技(深圳)有限公司 Method for controlling application program, use equipment and server
CN103544583A (en) * 2013-10-22 2014-01-29 郑恒强 Container packing/unpacking evidence collecting system based on mobile intelligent terminal and network technique
CN104796491A (en) * 2015-05-07 2015-07-22 北京智膜科技有限公司 Server and software downloading and registration method based on once code-scanning
US20170220330A1 (en) * 2016-01-28 2017-08-03 T-Mobile, Usa, Inc. Remote support installation mechanism
CN107391971A (en) * 2017-06-13 2017-11-24 北京航天发射技术研究所 A kind of guard method of software license mandate
CN107688754A (en) * 2017-10-20 2018-02-13 国信嘉宁数据技术有限公司 A kind of electronic evidence evidence collecting method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544409A (en) * 2012-07-11 2014-01-29 腾讯科技(深圳)有限公司 Method for controlling application program, use equipment and server
CN102917059A (en) * 2012-10-19 2013-02-06 北京奇虎科技有限公司 Client end and method for downloading application
CN102981879A (en) * 2012-12-03 2013-03-20 中国联合网络通信集团有限公司 Supply method, acquisition method, equipment and processing system of application software installation package
CN103544583A (en) * 2013-10-22 2014-01-29 郑恒强 Container packing/unpacking evidence collecting system based on mobile intelligent terminal and network technique
CN104796491A (en) * 2015-05-07 2015-07-22 北京智膜科技有限公司 Server and software downloading and registration method based on once code-scanning
US20170220330A1 (en) * 2016-01-28 2017-08-03 T-Mobile, Usa, Inc. Remote support installation mechanism
CN107391971A (en) * 2017-06-13 2017-11-24 北京航天发射技术研究所 A kind of guard method of software license mandate
CN107688754A (en) * 2017-10-20 2018-02-13 国信嘉宁数据技术有限公司 A kind of electronic evidence evidence collecting method and device

Similar Documents

Publication Publication Date Title
CN107026836B (en) Service implementation method and device
CN107911340B (en) Login verification method, device and equipment of application program and storage medium
CN104268756B (en) Method of mobile payment and system
CN112015510B (en) Examination system management method and examination system
CN108959884B (en) Human authentication verification device and method
CN101720030A (en) Method and system for transmitting video data and camera equipment
TW201909014A (en) Verifying method of specified condition, verifying software of specified condition, device and server for executing verification of specified condition
CN107896227A (en) Data calling method and device and equipment data cloud platform
JP2008225813A (en) Face recognition method operating on web browser and its program
CN111314389A (en) Face authentication method, face authenticator and readable storage medium
CN106469269B (en) A kind of method, apparatus and terminal of Password Management
CN108733385A (en) Application program installation method, device, equipment and storage medium
CN110077361B (en) Vehicle control method and device
JP2007233609A (en) Authentication device, authentication system, and authentication method
CN108830532A (en) Logistics management-control method and system
CN109495491A (en) Information collecting method and system
CN108256328A (en) Identify the method and device of counterfeit application
CN106600396A (en) Account information upgrading method and device
KR20180047358A (en) Online one-stop testing and evalution management system and testing and evaluation management method using the system
CN111862428B (en) Access control method and device
CN106097531B (en) A kind of reserving method and mobile terminal and access control system applied to access control system
KR101927336B1 (en) APPARATUS AND METHOD FOR IDENTIFY TERMINAL DEVICE USER and FALSIFICATION OR TEMPERING
JP2004234543A (en) Person's identity confirmation method, information equipment and person's identity confirmation system
RU2736576C1 (en) Method of remote registration of a mobile communication user by means of a mobile communication device equipped with a shooting module and a touch screen
CN104517048A (en) Electronic seal implementing system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190319