CN110278112A - A kind of computer access to LAN is followed by managed control method - Google Patents
A kind of computer access to LAN is followed by managed control method Download PDFInfo
- Publication number
- CN110278112A CN110278112A CN201910489401.0A CN201910489401A CN110278112A CN 110278112 A CN110278112 A CN 110278112A CN 201910489401 A CN201910489401 A CN 201910489401A CN 110278112 A CN110278112 A CN 110278112A
- Authority
- CN
- China
- Prior art keywords
- module
- computer
- management software
- cell phone
- phone client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/20—Network management software packages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Stored Programmes (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of computer access to LAN to be followed by managed control method, more particularly to field of computer technology, including local area network, center control holder, management software and cell phone client, the management software includes key production module, authentication module and examination module, there are logging modle and automatic installation module in the examination module attachment end connecting pin, the logging modle connecting pin is connected with backup module, and concrete operation step is as follows.The present invention passes through in mobile phone cell phone client downloaded and installed, be conducive to verify computer by cell phone client, one-to-one locking can be carried out to cell phone client and by the computer that the cell phone client unlocks, when center, control holder is tested with when problem occurs for computer or when carrying out malfeasance, the informational linkage in the registration module in corresponding cell phone client to user, the efficiency of the management after improving computer access to LAN can be passed through.
Description
Technical field
The present invention relates to field of computer technology, it is more particularly related to after a kind of computer access to LAN
Receive the control method of management.
Background technique
Local area network (Local Area Network, LAN) refers to the meter being mutually unified into a certain region by multiple stage computers
Calculate unit.Usually have an area of within several kms.File management may be implemented in local area network, application software is shared, sharing printer, work
Make the functions such as schedule, Email and the facsimile service in group.Local area network be it is case type, can be by office
Two computers composition, can also be made of thousands of computers in a company.
The patent of 101917440 B of patent application publication CN discloses adopter after a kind of computer access to LAN
The control method and system of reason, management server and no less than a computer installs client software in same local area network;Pipe
Server configuration communication rule and communications parameter is managed, and communication rule and communications parameter be simultaneously sent to to have installed client soft
The computer of part is stored;The computer newly to network initiates communication request to local area network, has installed the calculating of client software
Machine listens to the communication request of the computer newly to network;The computer of client software has been installed according to communication rule and communications parameter
Judge whether the computer newly to network is mounted with client software.
But still there is more disadvantage in practice in above-mentioned technical proposal, such as the computer peace in local area network
The efficiency for filling client software is lower, thus the efficiency of lower management.
Summary of the invention
In order to overcome the drawbacks described above of the prior art, the embodiment of the present invention provides a kind of computer access to LAN and is followed by
Managed control method, by being conducive to through cell phone client to calculating in mobile phone cell phone client downloaded and installed
Machine is verified, and can carry out one-to-one locking to cell phone client and by the computer that the cell phone client unlocks, when
Center control holder be tested with computer occur problem when or carry out malfeasance when, corresponding cell phone client can be passed through
Informational linkage in interior registration module is to user, the efficiency of the management after improving computer access to LAN.
To achieve the above object, the invention provides the following technical scheme: a kind of computer access to LAN be followed by it is managed
Control method, including local area network, center control holder, management software and cell phone client, the management software include key
Generation module, authentication module and examination module, the examination module attachment end are connected with logging modle and automatic installation module, institute
It states logging modle connecting pin and is connected with backup module, specific steps are as follows:
Step 1: prepare local area network, the computer that center control holder and at least a local area network network;
Step 2: the computer local area network newly to network initiates communication request;
Step 3: center control holder sends management software to the computer newly to network;
Step 4: the computer for being equipped with management software automatically generates a random key by management software;
Step 5: random key is inputted and is entered in mobile phone cell phone client downloaded and installed by user, is led to
Row identifying code, and identifying code is input in the management software of computer, so that this computer is obtained networking qualification;
Step 6: the computer for being equipped with management software initiates communication request by local area network;
Step 7: installed examination module on the computer of management software to the computer of communication object whether installing pipe
Reason software is screened;
Step 8: when screening module while being screened, logging modle records this behavior, and by information
Backup module is transmitted to be backed up;
Step 9: when that screens that module screens out communication object is not installed with management software, to not installing management software
Computer is locked, and automatic installation module is sent to it, is installed to management software.
In a preferred embodiment, the key production module for generating key, the authentication module at random
For verifying to the verifying that user inputs, there are logging modle and automatic installation mould in the examination module attachment end connecting pin
Block.
In a preferred embodiment, in the step 7, screen module be used for the computer communicated into
Row is screened, and sees whether be equipped with management software.
In a preferred embodiment, in the step 5, cell phone client includes registration module, password generation mould
Block and locking module generate pass authentication code according to the random key that key production module generates at random.
In a preferred embodiment, in the step 9, locking module is used for cell phone client and by being somebody's turn to do
The computer of cell phone client unlock carries out one-to-one locking, and when center, control holder is tested with computer generation problem
When, user can be related to by corresponding cell phone client.
In a preferred embodiment, the registration module is used to carry out authentication to user and tie up
It is fixed, and each cell phone client can only correspond to an effective identity, the auth method includes face recognition, cell-phone number note
Volume and identity card registration.
In a preferred embodiment, in the step 8, logging modle connecting pin and backup module connecting pin phase
Connection, the logging modle is used to record the examination information for screening module, and information is transmitted to backup module, described standby
Part module is used to carry out record to examination information to back up.
In a preferred embodiment, in the step 9, automatic module of installing includes pipeline software installation packet, is used
In to computer installation management software.
Technical effect and advantage of the invention:
1, center control holder sends management software to the computer newly to network, and the computer for being equipped with management software passes through
Key production module automatically generates a random key, and user, and will be random in mobile phone cell phone client downloaded and installed
Key is inputted into secret generation module, obtains pass authentication code by secret generation module, and identifying code is input to verifying
In module, so that this computer is obtained networking qualification after, be conducive to verify computer by cell phone client, and locks
Cover half block can carry out one-to-one locking to cell phone client and by the computer that the cell phone client unlocks, when center is controlled
When holder processed is tested with computer generation problem, user can be related to by corresponding cell phone client, improve meter
The efficiency of management after calculation machine access to LAN, and registration module is used to carry out authentication to user and bind, and
Each cell phone client can only correspond to an effective identity, the auth method include face recognition, cell-phone number registration and
Identity card registration can pass through corresponding cell phone customer when control holder has monitored that computer carries out malfeasance when center
The information in registration module in end is quickly found out the installation people of the computer, improves the efficiency of management;
2, having installed examination module on the computer of management software, whether to install management to the computer of communication object soft
Part is screened, when screening module while being screened, when that screens that module screens out communication object is not installed with management
Software locks the computer for not installing management software, and automatic installation module is sent to it, pacifies to management software
Dress is conducive to whether install management to the computer of communication object by the examination module on the computer of having installed management software
Software is screened, and is cooperated center control holder to detect the computer newly to network, is effectively increased pushing away for management software
Wide installation effectiveness, and this method is independent of hardware or other network equipments, avoid to other equipment and complex environment according to
Rely;
3, when screening module while being screened, logging modle records this behavior, and information is transmitted to
Backup module is backed up, and backup module can will screen information and back up, and being conducive to the later period is inquired, can also be to two
Connection between a computer is recorded.
Detailed description of the invention
Fig. 1 is control flow schematic diagram of the invention.
Fig. 2 is control system architecture schematic diagram of the invention.
Fig. 3 is mobile phone client system flow diagram of the invention.
Fig. 4 is management software system flow diagram of the invention.
Appended drawing reference are as follows: 1 local area network, 2 center control holders, 3 management softwares, 301 key production modules, 302 are tested
Demonstrate,prove module, 303 examination modules, 4 cell phone clients, 401 registration modules, 402 secret generation modules, 403 locking modules, 5
Automatic installation module, 6 logging modles, 7 backup modules.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
A kind of computer access to LAN according to shown in Fig. 1-4 is followed by managed control method, including local area network 1,
Center control holder 2, management software 3 and cell phone client 4, the management software 3 include key production module 301, verifying mould
Block 302 and examination module 303,303 connecting pin of examination module are connected with logging modle 6 and automatic installation module 5, the note
Record 6 connecting pin of module is connected with backup module 7, specific steps are as follows:
Step 1: prepare local area network 1, the computer that center control holder 2 and an at least local area network 1 network;
Step 2: the computer local area network 1 newly to network initiates communication request;
Step 3: center control holder 2 sends management software 3 to the computer newly to network;
Step 4: the computer for being equipped with management software 3 automatically generates a random key by management software 3;
Step 5: random key is inputted and is entered in mobile phone cell phone client 4 downloaded and installed by user, is obtained
Pass authentication code, and identifying code is input in the management software 3 of computer, so that this computer is obtained networking qualification;
Step 6: the computer for being equipped with management software 3 initiates communication request by local area network 1;
Step 7: whether the examination module 303 installed on the computer of management software 3 pacifies the computer of communication object
Dress management software 3 is screened;
Step 8: when screening module 303 while being screened, logging modle 6 records this behavior, and will
Information is transmitted to backup module 7 and is backed up;
Step 9: when that screens that module 303 screens out communication object is not installed with management software 3, to not installing, management is soft
The computer of part 3 is locked, and automatic installation module 5 is sent to it, is installed to management software 3.
Further, the key production module 301 is used for for generating key, the authentication module 302 at random to making
The verifying of user's input is verified, and there are logging modle 6 and automatic installation module 5 in the 303 connecting pin connecting pin of examination module.
Further, in the step 7, module 303 is screened for screening to the computer communicated, seeing is
It is no that management software 3 is installed.
Further, in the step 5, cell phone client 4 includes registration module 401, secret generation module 402 and lock
Cover half block 403 generates pass authentication code according to the random key that key production module 301 generates at random.
Further, in the step 9, locking module 403 is used for cell phone client 4 and passes through the cell phone client 4
The computer of unlock carries out one-to-one locking, when center, control holder 2 is tested with computer generation problem, can pass through
Corresponding cell phone client 4 relates to user.
Further, the registration module 401 is used to carry out authentication to user and bind, and each mobile phone
Client 4 can only correspond to an effective identity, and the auth method includes face recognition, cell-phone number registration and identity card note
Volume.
Further, in the step 8,6 connecting pin of logging modle is connected with 7 connecting pin of backup module, the record
Module 6 is used to record the examination information for screening module 303, and information is transmitted to backup module 7, the backup module 7
It is backed up for carrying out record to examination information.
Further, in the step 9, automatic module 5 of installing includes pipeline software installation packet, for pacifying to computer
Fill management software 3.
Working principle of the present invention:
Referring to Figure of description 1-4, the computer local area network 1 newly to network initiates communication request, the computer before networking
The monitoring of holder 2 is controlled by center, center control holder 2 sends management software 3 to the computer newly to network, when center is controlled
Holder 2 processed monitors that computer newly networks, and is just sent to it management software 3, and management software 3 includes key production module
301, authentication module 302 and examination module 303, the computer for being equipped with management software 3 are generated by the key in management software 3
Module 301 automatically generates a random key, and user wraps in mobile phone cell phone client 4 downloaded and installed, cell phone client 4
Registration module 401, secret generation module 402 and locking module 403 are included, and random key is inputted into secret generation module 402
It is interior, pass authentication code is obtained by secret generation module 402, and identifying code is input to testing in the management software 3 of computer
Module 302 is demonstrate,proved, so that this computer is obtained networking qualification after, is conducive to verify computer by cell phone client 4,
And locking module 403 can carry out one-to-one lock to cell phone client 4 and by the computer that the cell phone client 4 unlocks
Fixed, when center, control holder 2 is tested with computer generation problem, can be related to by corresponding cell phone client 4 makes
User, the efficiency of the management after improving computer access to LAN 1, and registration module 401 are used to carry out identity to user
It verifies and is bound, and each cell phone client 4 can only correspond to an effective identity, the auth method includes face
Identification, cell-phone number registration and identity card registration can be with when center, control holder 2 has monitored that computer carries out malfeasance
By the information in the registration module 401 in corresponding cell phone client 4, it is quickly found out the installation people of the computer, is improved
The efficiency of management;
Referring to Figure of description 1-4, the computer for being equipped with management software 3 initiates communication request by local area network 1,
The examination module 303 installed on the computer of management software 3 is discriminated to whether the computer of communication object installs management software 3
Not, when screening module 303 while being screened, logging modle 6 records this behavior, and information is transmitted to backup
Module 7 is backed up, when that screens that module 303 screens out communication object is not installed with management software 3, to not installing management software
3 computer is locked, and automatic installation module 5 is sent to it, and automatic module 5 of installing includes pipeline software installation packet, right
Management software 3 is installed, and is conducive to through the examination module 303 on the computer of having installed management software 3 to communication object
Computer whether management software 3 be installed screened, cooperate center control holder 2 to detect the computer newly to network,
It effectively increases the popularization installation effectiveness of management software 3, and this method is independent of hardware or other network equipments, avoids pair
The dependence of other equipment and complex environment, and backup module 7 can will screen information and back up, being conducive to the later period is looked into
It askes, the connection between two computers can also be recorded.
Last: the foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, all in the present invention
Spirit and principle within, any modification, equivalent replacement, improvement and so on, should be included in protection scope of the present invention it
It is interior.
Claims (8)
1. a kind of computer access to LAN is followed by managed control method, it is characterised in that: including local area network (1), center
Control holder (2), management software (3) and cell phone client (4), the management software (3) include key production module (301),
Authentication module (302) and examination module (303), examination module (303) connecting pin are connected with logging modle (6) and automatic peace
Die-filling piece (5), logging modle (6) connecting pin is connected with backup module (7), specific steps are as follows:
Step 1: prepare the computer of local area network (1), center control holder (2) and the networking of an at least local area network (1);
Step 2: the computer local area network (1) newly to network initiates communication request;
Step 3: center control holder (2) sends management software (3) to the computer newly to network;
Step 4: the computer for being equipped with management software (3) automatically generates a random key by management software (3);
Step 5: random key is inputted and is entered in mobile phone cell phone client downloaded and installed (4) by user, is led to
Row identifying code, and identifying code is input in the management software (3) of computer, so that this computer is obtained networking qualification;
Step 6: the computer for being equipped with management software (3) initiates communication request by local area network (1);
Step 7: whether the examination module (303) installed on the computer of management software (3) pacifies the computer of communication object
Dress management software (3) is screened;
Step 8: when screening module (303) while being screened, logging modle (6) records this behavior, and will
Information is transmitted to backup module (7) and is backed up;
Step 9: when that screens that module (303) screen out communication object is not installed with management software (3), to not installing, management is soft
The computer of part (3) is locked, and automatic installation module (5) is sent to it, is installed to management software (3).
2. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that:
The key production module (301) is used for the verifying inputted to user for generating key, the authentication module (302) at random
It is verified.
3. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that:
In the step 7, module (303) are screened for screening to the computer communicated, see whether management software is installed
(3)。
4. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that:
In the step 5, cell phone client (4) includes registration module (401), secret generation module (402) and locking module (403),
Pass authentication code is generated at random according to the random key that key production module (301) generate.
5. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that:
In the step 9, locking module (403) is used for cell phone client (4) and the calculating unlocked by the cell phone client (4)
Machine carries out one-to-one locking, when center control holder (2) is tested with computer, and problem occurs, can pass through corresponding hand
Machine client (4) relates to user.
6. a kind of computer access to LAN according to claim 4 is followed by managed control method, it is characterised in that:
The registration module (401) is used to carry out authentication to user and bind, and each cell phone client (4) can only be right
An effective identity is answered, the auth method includes face recognition, cell-phone number registration and identity card registration.
7. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that:
In the step 8, logging modle (6) connecting pin is connected with backup module (7) connecting pin, the logging modle (6) for pair
The examination information for screening module (303) is recorded, and information is transmitted to backup module (7), the backup module (7) for pair
Examination information carries out record and is backed up.
8. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that:
In the step 9, installing module (5) automatically includes pipeline software installation packet, for installing management software (3) to computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910489401.0A CN110278112B (en) | 2019-06-06 | 2019-06-06 | Control method for receiving management after computer accessing local area network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910489401.0A CN110278112B (en) | 2019-06-06 | 2019-06-06 | Control method for receiving management after computer accessing local area network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278112A true CN110278112A (en) | 2019-09-24 |
CN110278112B CN110278112B (en) | 2022-03-29 |
Family
ID=67961935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910489401.0A Active CN110278112B (en) | 2019-06-06 | 2019-06-06 | Control method for receiving management after computer accessing local area network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278112B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020099940A1 (en) * | 2001-01-19 | 2002-07-25 | Jieh-Shan Wang | Secure internet applications with mobile code |
US20130205293A1 (en) * | 2012-02-02 | 2013-08-08 | Sungard Availability Services, Lp | Network topology-aware recovery automation |
CN105376074A (en) * | 2015-12-14 | 2016-03-02 | 周海斌 | Startup and timing control method and system of client computers in local area network |
CN105592021A (en) * | 2014-11-12 | 2016-05-18 | 成都安慧科技有限公司 | Novel internal network security protection method |
-
2019
- 2019-06-06 CN CN201910489401.0A patent/CN110278112B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020099940A1 (en) * | 2001-01-19 | 2002-07-25 | Jieh-Shan Wang | Secure internet applications with mobile code |
US20130205293A1 (en) * | 2012-02-02 | 2013-08-08 | Sungard Availability Services, Lp | Network topology-aware recovery automation |
CN105592021A (en) * | 2014-11-12 | 2016-05-18 | 成都安慧科技有限公司 | Novel internal network security protection method |
CN105376074A (en) * | 2015-12-14 | 2016-03-02 | 周海斌 | Startup and timing control method and system of client computers in local area network |
Non-Patent Citations (1)
Title |
---|
周霄红: "大中型企业内部局域网非法接入问题的研究", 《行业应用》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110278112B (en) | 2022-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101094056B (en) | Security system of wireless industrial control network, and method for implementing security policy | |
US5524052A (en) | Communication network access method and system | |
CN1302634C (en) | Network connection system | |
US9634834B1 (en) | Distributed cryptographic management for computer systems | |
US6678826B1 (en) | Management system for distributed out-of-band security databases | |
CN101751712B (en) | Centralized invoice authentication system and authentication method | |
CN101730094B (en) | Method for accessing terminal equipment to service platform of security system and transmitting information | |
CN105430000A (en) | Cloud computing security management system | |
WO2005033829A2 (en) | Centralized network control | |
CN108966216B (en) | Mobile communication method and system applied to power distribution network | |
CN114866346B (en) | Password service platform based on decentralization | |
CN101345723B (en) | Management authentication method and system of client gateway | |
CN109818774A (en) | Automatic sensing asset acquisition device, method and computer readable storage medium | |
US20040122923A1 (en) | Systems and methods for improved multisite management of converged communication systems and computer systems | |
CN110278112A (en) | A kind of computer access to LAN is followed by managed control method | |
CN114466038B (en) | Communication protection system of electric power thing networking | |
CN101646172B (en) | Method and device for generating key in distributed MESH network | |
CN107317787A (en) | Service credit method, equipment and system | |
CN110460562A (en) | A kind of long-range Activiation method of POS terminal and system | |
CN101442447B (en) | Method for implementing authentication proxy in NGN listen-in system and listen-in gateway | |
CN113672655A (en) | File collaborative checking method and device based on block chain | |
CN102013979A (en) | Anti-counterfeiting authentication system | |
CN106878378B (en) | Scatter processing method in network communication management | |
CN100396046C (en) | A method for implementing authorized verification and authorized verification processing module thereof | |
CN109634723A (en) | The communication means for carrying module is deposited in fusion and load module is deposited in fusion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |