CN109495491A - Information collecting method and system - Google Patents
Information collecting method and system Download PDFInfo
- Publication number
- CN109495491A CN109495491A CN201811480687.8A CN201811480687A CN109495491A CN 109495491 A CN109495491 A CN 109495491A CN 201811480687 A CN201811480687 A CN 201811480687A CN 109495491 A CN109495491 A CN 109495491A
- Authority
- CN
- China
- Prior art keywords
- terminal device
- server
- information
- verification information
- data acquisition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000002513 implantation Methods 0.000 claims abstract description 35
- 239000007943 implant Substances 0.000 claims abstract description 14
- 238000012795 verification Methods 0.000 claims description 66
- 238000013475 authorization Methods 0.000 claims description 8
- 238000011835 investigation Methods 0.000 abstract description 9
- 230000005540 biological transmission Effects 0.000 description 7
- 238000009434 installation Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000003826 tablet Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/302—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Evolutionary Computation (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The disclosure provides a kind of information collecting method and system, is related to information technology field, is able to solve the problem of can not acquiring forensic information.The specific technical proposal is: terminal device sends implantation request to server, the implantation request is for requesting implant data capture program;The server sends the data acquisition program to the terminal device;The installing terminal equipment simultaneously runs the data acquisition program, and Xiang Suoshu server sends the collected information of the data acquisition program institute.The disclosure is for acquiring investigation and evidence collection information.
Description
Technical field
This disclosure relates to information technology field more particularly to information collecting method and system.
Background technique
With the high speed development of mobile Internet, the appearance of smart phone gives many-sided all bands such as people's lives, work
Carry out great convenience, but the case that offender carries out high-tech crime using smart phone simultaneously is more and more, therefore
For public security department, acquiring evident information out of smart phone becomes important evidence obtaining approach.
In the related technology, it needs to be implanted into data acquisition program toward smart phone under USB debugging mode.However, at present
Smart phone more and more limitations are provided with to starting USB debugging mode, such as need to input the verification information of owner
It can starting.The information in smart phone can not be just collected when USB debugging mode can not be started, and influence to investigate and collect evidence.
Summary of the invention
The embodiment of the present disclosure provides a kind of information collecting method and system, and asking for forensic information can not be acquired by being able to solve
Topic.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of information collecting method is provided, this method comprises:
Terminal device sends implantation request to server, and the implantation request is for requesting implant data capture program;
The server sends the data acquisition program to the terminal device;
The installing terminal equipment simultaneously runs the data acquisition program, and Xiang Suoshu server sends the data and acquires journey
The collected information of sequence institute.
Technical solution provided by the present disclosure, terminal device send implantation request to server, and server is returned to terminal device
Data acquisition program, installing terminal equipment and operation data capture program are returned, the collected information of institute is sent to server, completes
Forensic information acquisition.Terminal device receives data acquisition program from server, in the case where USB debugging mode can not be started,
Also can implant data capture program, complete the acquisition of forensic information.
In one embodiment, the terminal device sends implantation request to server, comprising:
Terminal device identification target two dimensional code obtains the access address of the server, according to the access address to
The server sends implantation request.
Terminal device can trigger implantation request by way of identifying two dimensional code, simple and quick.
In one embodiment, it before the server sends the data acquisition program to the terminal device, also wraps
It includes:
The server receives the verification information that the terminal device is sent, and the verification information includes the terminal device
Equipment identification information, the identification information investigated case, the identity identification information of personnel of collecting evidence, personnel concerning the case identification letter
At least one of breath;
Determine that the verification information received from the terminal device matches with pre-stored verification information.
The verification information that server authentication terminal device is sent sends data to terminal device again after being verified and acquires journey
Sequence prevents data acquisition program to be illegally used.
In one embodiment, it before the server sends the data acquisition program to the terminal device, also wraps
It includes:
The server sends the first verification information to the security terminal by certification;
Receive the second verification information that the terminal device is sent;
Determine that first verification information and second verification information match.
Server sends the first verification information to security terminal, and receives and the terminal device for carrying out information collection is needed to be sent out
The second verification information sent sends number when determining that the first verification information and the second verification information match, then to terminal device
According to capture program, guarantee that the evidence obtaining personnel for holding security terminal just can prevent from counting to terminal device implant data capture program
It is illegally used according to capture program.
In one embodiment, before the terminal device operation data acquisition program, further includes:
The terminal device sends operation request to the server, and the operation request includes the mark of the terminal device
Know information;
The server determines the terminal device in pre-stored white list according to the identification information of the terminal device
When interior, Xiang Suoshu terminal device sends operation authorization instruction.
Server is pre-stored white list, and the terminal device in the white list can just operate normally data acquisition program,
Prevent the equipment misuse or illegal Usage data collection program except white list.
According to the second aspect of an embodiment of the present disclosure, a kind of information acquisition system, including terminal device and server are provided;
The terminal device, for sending implantation request to the server, the implantation request is for requesting implantation number
According to capture program;
The server, for sending the data acquisition program to the terminal device;
The terminal device, for installing and running the data acquisition program, Xiang Suoshu server sends the data
The collected information of capture program institute.
In one embodiment, the terminal device, target two dimensional code obtains the access of the server for identification
Location sends implantation request to the server according to the access address.
In one embodiment, the terminal device, for sending verification information, the verification information to the server
Equipment identification information including the terminal device, the identification information investigated case, the personnel that collect evidence identity identification information, case-involving
At least one of identity identification information of personnel;
The server, verification information and pre-stored verification information for determining to receive from the terminal device
Match.
In one embodiment, information acquisition system further includes the security terminal by certification;
The server, for sending the first verification information to the security terminal;
The terminal device, for sending the second verification information to the server;
The server, for determining that first verification information and second verification information match.
In one embodiment, the terminal device, for sending operation request, the operation request to the server
Identification information including the terminal device;
The server, for determining the terminal device pre-stored according to the identification information of the terminal device
When in white list, Xiang Suoshu terminal device sends operation authorization instruction.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart for information collecting method that the embodiment of the present disclosure provides;
Fig. 2 is a kind of flow chart for information collecting method that the embodiment of the present disclosure provides;
Fig. 3 is a kind of operation interface schematic diagram for terminal device that the embodiment of the present disclosure provides;
Fig. 4 is a kind of structure chart for information acquisition system that the embodiment of the present disclosure provides.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
In the related technology, it needs to be implanted into data acquisition program toward smart phone under USB debugging mode.If cannot open
Dynamic USB debugging mode, can not just collect the information in smart phone, influence to investigate and collect evidence.
Embodiment of the disclosure provides a kind of collecting method and system, in the case where not starting USB debugging mode,
Also can implant data capture program, complete the acquisition of forensic information.As shown in Figure 1, the collecting method the following steps are included:
101, terminal device sends implantation request to server.
Terminal device includes but is not limited to the electronic equipments such as smart phone, tablet computer, PC.The implementation of the disclosure
So-called terminal device in example, refers to the terminal device of evidence obtaining to be investigated.Implantation request is for requesting implant data capture program.
In one embodiment, investigation and evidence collection personnel can input the access of server into the browser of terminal device
Location, triggering implantation request.
In one embodiment, terminal device identification target two dimensional code obtains the access address of server, according to access
Location sends implantation request to server.
For example, terminal device can be scanned by camera target two dimensional code or terminal device by social software or
Other application receives the picture of target two dimensional code, identifies the two dimensional code on the picture.
Target two dimensional code is pre-generated two dimensional code, the two dimensional code usually put on record by public security department.Target two dimension
Code can carry the information such as access address or data acquisition program store path, such as may include right identification information.The permission
It is the two dimensional code licensed by public security department that identification information, which may be used to indicate the two dimensional code, or instruction have using this two
The personnel for tieing up code weight limit or unit etc..Terminal device triggers implantation request by way of identifying two dimensional code, without starting eventually
The USB debugging mode of end equipment, it is simple and quick.
102, server sends data acquisition program to terminal device.
Server pre-saves data acquisition program, after receiving implantation request, can send data to terminal device and adopt
Collect program.
103, it is collected to send data acquisition program institute to server for installing terminal equipment and operation data capture program
Information.
After terminal device receives data acquisition program, installs and run the program.When data acquisition program is run, from end
Information of the end equipment acquisition for investigation and evidence collection, is sent to server for collected information.
The embodiment of the present disclosure provide information collecting method, terminal device to server send implantation request, server to
Terminal device returned data capture program, installing terminal equipment and operation data capture program are collected to server transmission
Information, complete forensic information acquisition.Terminal device receives data acquisition program from server, is not starting USB debugging mode
In the case where, also can implant data capture program, complete the acquisition of forensic information.
Based on the information collecting method that the corresponding embodiment of above-mentioned Fig. 1 provides, another embodiment of the disclosure is to information collection
Method has done further supplementary explanation.The step in content embodiment corresponding with Fig. 1 in part of step is identical or class
Seemingly, it only elaborates below to difference in step.
Referring to shown in Fig. 2, information collecting method provided in this embodiment the following steps are included:
201, terminal device sends implantation request to server.
Implantation request is for requesting implant data capture program.
202, server determines that terminal device is the terminal device for allowing installation data capture program.
Data acquisition program is used to acquire the information needed for investigating and collecting evidence, and is related to information security, to prevent data from acquiring journey
Sequence is abused or illegally uses, it is therefore desirable to determine whether installing terminal equipment data acquisition program.When determining permission
Just data acquisition program is sent to terminal device.
It is as follows that embodiment of the disclosure provides two kinds of exemplary illustrations, it is emphasized that following two example is only to show
Example property explanation and it is non exhaustive.
Example one
After server receives the implantation request of terminal device transmission, server instruction terminal equipment provides verification information.
Referring to the display interface schematic diagram of terminal device shown in Fig. 3, investigation and evidence collection personnel can be by verification information input terminal equipment, eventually
Verification information is sent to server by end equipment.
Optionally, verification information may include the equipment identification information of terminal device, the identification information that investigates case, evidence obtaining people
Identity identification information, at least one of the identity identification information of personnel concerning the case of member.
By taking terminal device is the situation of mobile phone as an example, equipment identification information includes but is not limited to the international mobile device of mobile phone
Identification code (full name in English: International Mobile Equipment Identity, English abbreviation: IMEI), mobile phone vendor
The information such as quotient, model, telephone number.
The identification information investigated case includes but is not limited to the letter that the public security departments such as investigated case docket put on record
Breath.
The identity identification information of evidence obtaining personnel, the work number, identification card number etc. of including but not limited to investigation and evidence collection personnel are used for
Identify the information of personnel identity.
The identity of personnel concerning the case is including but not limited to personnel's body for identification such as identification card number of respondent by information
The information of part.
After server receives the verification information of terminal device transmission, determine that the verification information received from terminal device is
It is no to match with pre-stored verification information.If so, triggering step 203, sends data acquisition program to terminal device.If
It is no, then stop executing subsequent step.
The verification information that server authentication terminal device is sent sends data to terminal device again after being verified and acquires journey
Sequence prevents data acquisition program to be illegally used.
Example two
After server receives the implantation request of terminal device transmission, server is tested to the security terminal transmission by certification
Information is demonstrate,proved, and indicates that the terminal device (hereinafter referred to as terminal device) of evidence obtaining to be investigated provides verification information.
Investigation and evidence collection personnel can hold security terminal, the verification information input terminal equipment which is received,
The verification information that investigation and evidence collection personnel input is sent to server by terminal device.
For purposes of illustration only, server is known as the first verification information to the verification information that security terminal is sent, by server
The verification information received from terminal device is known as the second verification information.
Server sends the first verification information, the second verifying that receiving terminal apparatus is sent to the security terminal by certification
Information, determines whether the first verification information matches with the second verification information.If so, triggering step 203, sends out to terminal device
Send data acquisition program.If it is not, then stopping executing subsequent step.
Server is when determining that the first verification information and the second verification information match, then sends data to terminal device and adopt
Collect program, guarantees that the evidence obtaining personnel for holding security terminal just can prevent data from adopting to terminal device implant data capture program
Collection program is illegally used.
203, server sends data acquisition program to terminal device.
Server determines that terminal device is when allowing the terminal device of installation data capture program, to send to the terminal device
Data acquisition program.
204, installing terminal equipment data acquisition program.
205, terminal device obtains the authorization instruction of operation data capture program to server.
After installing terminal equipment data acquisition program, data acquisition program can obtain the identification information of terminal device.It is anti-
Only data acquisition program is illegally used, and data acquisition program starts Shi Kexiang server request operation data capture program
Authorization instruction.
For example, terminal device sends operation request to server, operation request includes the identification information of terminal device.Service
When device determines that terminal device is in pre-stored white list according to the identification information of terminal device, operation is sent to terminal device and is awarded
Power instruction.
When terminal device receives operation authorization instruction, data acquisition program could be operated normally to acquire from terminal device and be used
In the information of investigation and evidence collection.
Server is pre-stored white list, and the terminal device in the white list can just operate normally data acquisition program,
Prevent the illegal Usage data collection program of the equipment except white list.
206, terminal device operation data capture program sends the collected information of data acquisition program institute to server.
After terminal device receives operation authorization instruction, data acquisition program brings into operation, and is used for from terminal device acquisition
Collected information is sent to server by the information of investigation and evidence collection.
The embodiment of the present disclosure provide information collecting method, terminal device to server send implantation request, server to
Terminal device returned data capture program, installing terminal equipment and operation data capture program are collected to server transmission
Information, complete forensic information acquisition.Terminal device receives data acquisition program from server, can not start USB debugging mould
In the case where formula, also can implant data capture program, complete the acquisition of forensic information.And pass through the safety before installation, before operation
Verifying measure, prevents data acquisition program to be illegally used.
It is following for disclosure device reality based on information collecting method described in the corresponding embodiment of above-mentioned Fig. 1-Fig. 3
Example is applied, can be used for executing embodiments of the present disclosure.
The embodiment of the present disclosure provides a kind of information acquisition system, as shown in figure 4, information acquisition system includes terminal device 41
With server 42.
Terminal device 41, for sending implantation request to server 42, implantation request is for requesting implant data to acquire journey
Sequence.
Server 42, for sending data acquisition program to terminal device 41.
Terminal device 41 sends data acquisition program to server 42 and is adopted for installing simultaneously operation data capture program
The information collected.
In one embodiment, terminal device 41, target two dimensional code obtains the access address of server 42, root for identification
Implantation request is sent to server 42 according to access address.
In one embodiment, terminal device 41, for sending verification information to server 42, verification information includes terminal
The equipment identification information of equipment 41, the identification information investigated case, the identity identification information of personnel of collecting evidence, the identity of personnel concerning the case
At least one of identification information.
Server 42, verification information and pre-stored verification information phase for determining to receive from terminal device 41
Match.
In one embodiment, information acquisition system further includes the security terminal 43 by certification.
Server 42, for sending the first verification information to security terminal 43.
Terminal device 41, for sending the second verification information to server 42.
Server 42, for determining that the first verification information and the second verification information match.
In one embodiment, terminal device 41, for sending operation request to server 42, operation request includes terminal
The identification information of equipment 41.
Server 42, for determining terminal device 41 in pre-stored white list according to the identification information of terminal device 41
When interior, operation authorization instruction is sent to terminal device 41.
The embodiment of the present disclosure provide information acquisition system, terminal device to server send implantation request, server to
Terminal device returned data capture program, installing terminal equipment and operation data capture program are collected to server transmission
Information, complete forensic information acquisition.Terminal device receives data acquisition program from server, can not start USB debugging mould
In the case where formula, also can implant data capture program, complete the acquisition of forensic information.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim is pointed out.
Claims (10)
1. a kind of information collecting method, which is characterized in that the described method includes:
Terminal device sends implantation request to server, and the implantation request is for requesting implant data capture program;
The server sends the data acquisition program to the terminal device;
The installing terminal equipment simultaneously runs the data acquisition program, and Xiang Suoshu server sends the data acquisition program institute
Collected information.
2. the method according to claim 1, wherein the terminal device sends implantation request, packet to server
It includes:
Terminal device identification target two dimensional code obtains the access address of the server, according to the access address to described
Server sends implantation request.
3. the method according to claim 1, wherein the server sends the data to the terminal device
Before capture program, further includes:
The server receives the verification information that the terminal device is sent, and the verification information includes setting for the terminal device
For in identification information, the identification information investigated case, the identity identification information of personnel of collecting evidence, the identity identification information of personnel concerning the case
At least one;
Determine that the verification information received from the terminal device matches with pre-stored verification information.
4. the method according to claim 1, wherein the server sends the data to the terminal device
Before capture program, further includes:
The server sends the first verification information to the security terminal by certification;
Receive the second verification information that the terminal device is sent;
Determine that first verification information and second verification information match.
5. the method according to claim 1, wherein the terminal device run the data acquisition program it
Before, further includes:
The terminal device sends operation request to the server, and the operation request includes that the mark of the terminal device is believed
Breath;
When the server determines that the terminal device is in pre-stored white list according to the identification information of the terminal device,
Operation authorization instruction is sent to the terminal device.
6. a kind of information acquisition system, which is characterized in that including terminal device to server;
The terminal device, for sending implantation request to the server, the implantation request is for requesting implant data to be adopted
Collect program;
The server, for sending the data acquisition program to the terminal device;
The terminal device, for installing and running the data acquisition program, Xiang Suoshu server sends the data acquisition
The collected information of program institute.
7. system according to claim 6, which is characterized in that
The terminal device, target two dimensional code obtains the access address of the server for identification, according to the access address
Implantation request is sent to the server.
8. system according to claim 6, which is characterized in that
The terminal device, for sending verification information to the server, the verification information includes the terminal device
Equipment identification information, the identification information investigated case, the identity identification information of personnel of collecting evidence, the identity identification information of personnel concerning the case
At least one of;
The server, verification information and pre-stored verification information phase for determining to receive from the terminal device
Match.
9. system according to claim 6, which is characterized in that further include the security terminal by certification;
The server, for sending the first verification information to the security terminal;
The terminal device, for sending the second verification information to the server;
The server, for determining that first verification information and second verification information match.
10. system according to claim 6, which is characterized in that
The terminal device, for sending operation request to the server, the operation request includes the terminal device
Identification information;
The server, for determining the terminal device in pre-stored white name according to the identification information of the terminal device
When in list, Xiang Suoshu terminal device sends operation authorization instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811480687.8A CN109495491A (en) | 2018-12-05 | 2018-12-05 | Information collecting method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811480687.8A CN109495491A (en) | 2018-12-05 | 2018-12-05 | Information collecting method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109495491A true CN109495491A (en) | 2019-03-19 |
Family
ID=65698271
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811480687.8A Pending CN109495491A (en) | 2018-12-05 | 2018-12-05 | Information collecting method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109495491A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102917059A (en) * | 2012-10-19 | 2013-02-06 | 北京奇虎科技有限公司 | Client end and method for downloading application |
CN102981879A (en) * | 2012-12-03 | 2013-03-20 | 中国联合网络通信集团有限公司 | Supply method, acquisition method, equipment and processing system of application software installation package |
CN103544409A (en) * | 2012-07-11 | 2014-01-29 | 腾讯科技(深圳)有限公司 | Method for controlling application program, use equipment and server |
CN103544583A (en) * | 2013-10-22 | 2014-01-29 | 郑恒强 | Container packing/unpacking evidence collecting system based on mobile intelligent terminal and network technique |
CN104796491A (en) * | 2015-05-07 | 2015-07-22 | 北京智膜科技有限公司 | Server and software downloading and registration method based on once code-scanning |
US20170220330A1 (en) * | 2016-01-28 | 2017-08-03 | T-Mobile, Usa, Inc. | Remote support installation mechanism |
CN107391971A (en) * | 2017-06-13 | 2017-11-24 | 北京航天发射技术研究所 | A kind of guard method of software license mandate |
CN107688754A (en) * | 2017-10-20 | 2018-02-13 | 国信嘉宁数据技术有限公司 | A kind of electronic evidence evidence collecting method and device |
-
2018
- 2018-12-05 CN CN201811480687.8A patent/CN109495491A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544409A (en) * | 2012-07-11 | 2014-01-29 | 腾讯科技(深圳)有限公司 | Method for controlling application program, use equipment and server |
CN102917059A (en) * | 2012-10-19 | 2013-02-06 | 北京奇虎科技有限公司 | Client end and method for downloading application |
CN102981879A (en) * | 2012-12-03 | 2013-03-20 | 中国联合网络通信集团有限公司 | Supply method, acquisition method, equipment and processing system of application software installation package |
CN103544583A (en) * | 2013-10-22 | 2014-01-29 | 郑恒强 | Container packing/unpacking evidence collecting system based on mobile intelligent terminal and network technique |
CN104796491A (en) * | 2015-05-07 | 2015-07-22 | 北京智膜科技有限公司 | Server and software downloading and registration method based on once code-scanning |
US20170220330A1 (en) * | 2016-01-28 | 2017-08-03 | T-Mobile, Usa, Inc. | Remote support installation mechanism |
CN107391971A (en) * | 2017-06-13 | 2017-11-24 | 北京航天发射技术研究所 | A kind of guard method of software license mandate |
CN107688754A (en) * | 2017-10-20 | 2018-02-13 | 国信嘉宁数据技术有限公司 | A kind of electronic evidence evidence collecting method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107026836B (en) | Service implementation method and device | |
CN107911340B (en) | Login verification method, device and equipment of application program and storage medium | |
CN104268756B (en) | Method of mobile payment and system | |
CN112015510B (en) | Examination system management method and examination system | |
CN108959884B (en) | Human authentication verification device and method | |
CN101720030A (en) | Method and system for transmitting video data and camera equipment | |
TW201909014A (en) | Verifying method of specified condition, verifying software of specified condition, device and server for executing verification of specified condition | |
CN107896227A (en) | Data calling method and device and equipment data cloud platform | |
JP2008225813A (en) | Face recognition method operating on web browser and its program | |
CN111314389A (en) | Face authentication method, face authenticator and readable storage medium | |
CN106469269B (en) | A kind of method, apparatus and terminal of Password Management | |
CN108733385A (en) | Application program installation method, device, equipment and storage medium | |
CN110077361B (en) | Vehicle control method and device | |
JP2007233609A (en) | Authentication device, authentication system, and authentication method | |
CN108830532A (en) | Logistics management-control method and system | |
CN109495491A (en) | Information collecting method and system | |
CN108256328A (en) | Identify the method and device of counterfeit application | |
CN106600396A (en) | Account information upgrading method and device | |
KR20180047358A (en) | Online one-stop testing and evalution management system and testing and evaluation management method using the system | |
CN111862428B (en) | Access control method and device | |
CN106097531B (en) | A kind of reserving method and mobile terminal and access control system applied to access control system | |
KR101927336B1 (en) | APPARATUS AND METHOD FOR IDENTIFY TERMINAL DEVICE USER and FALSIFICATION OR TEMPERING | |
JP2004234543A (en) | Person's identity confirmation method, information equipment and person's identity confirmation system | |
RU2736576C1 (en) | Method of remote registration of a mobile communication user by means of a mobile communication device equipped with a shooting module and a touch screen | |
CN104517048A (en) | Electronic seal implementing system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190319 |