CN110278112A - A kind of computer access to LAN is followed by managed control method - Google Patents

A kind of computer access to LAN is followed by managed control method Download PDF

Info

Publication number
CN110278112A
CN110278112A CN201910489401.0A CN201910489401A CN110278112A CN 110278112 A CN110278112 A CN 110278112A CN 201910489401 A CN201910489401 A CN 201910489401A CN 110278112 A CN110278112 A CN 110278112A
Authority
CN
China
Prior art keywords
module
computer
management software
cell phone
phone client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910489401.0A
Other languages
Chinese (zh)
Other versions
CN110278112B (en
Inventor
钟少君
邓志娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi University of Science and Technology
Original Assignee
Jiangxi University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi University of Science and Technology filed Critical Jiangxi University of Science and Technology
Priority to CN201910489401.0A priority Critical patent/CN110278112B/en
Publication of CN110278112A publication Critical patent/CN110278112A/en
Application granted granted Critical
Publication of CN110278112B publication Critical patent/CN110278112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/20Network management software packages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Stored Programmes (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of computer access to LAN to be followed by managed control method, more particularly to field of computer technology, including local area network, center control holder, management software and cell phone client, the management software includes key production module, authentication module and examination module, there are logging modle and automatic installation module in the examination module attachment end connecting pin, the logging modle connecting pin is connected with backup module, and concrete operation step is as follows.The present invention passes through in mobile phone cell phone client downloaded and installed, be conducive to verify computer by cell phone client, one-to-one locking can be carried out to cell phone client and by the computer that the cell phone client unlocks, when center, control holder is tested with when problem occurs for computer or when carrying out malfeasance, the informational linkage in the registration module in corresponding cell phone client to user, the efficiency of the management after improving computer access to LAN can be passed through.

Description

A kind of computer access to LAN is followed by managed control method
Technical field
The present invention relates to field of computer technology, it is more particularly related to after a kind of computer access to LAN Receive the control method of management.
Background technique
Local area network (Local Area Network, LAN) refers to the meter being mutually unified into a certain region by multiple stage computers Calculate unit.Usually have an area of within several kms.File management may be implemented in local area network, application software is shared, sharing printer, work Make the functions such as schedule, Email and the facsimile service in group.Local area network be it is case type, can be by office Two computers composition, can also be made of thousands of computers in a company.
The patent of 101917440 B of patent application publication CN discloses adopter after a kind of computer access to LAN The control method and system of reason, management server and no less than a computer installs client software in same local area network;Pipe Server configuration communication rule and communications parameter is managed, and communication rule and communications parameter be simultaneously sent to to have installed client soft The computer of part is stored;The computer newly to network initiates communication request to local area network, has installed the calculating of client software Machine listens to the communication request of the computer newly to network;The computer of client software has been installed according to communication rule and communications parameter Judge whether the computer newly to network is mounted with client software.
But still there is more disadvantage in practice in above-mentioned technical proposal, such as the computer peace in local area network The efficiency for filling client software is lower, thus the efficiency of lower management.
Summary of the invention
In order to overcome the drawbacks described above of the prior art, the embodiment of the present invention provides a kind of computer access to LAN and is followed by Managed control method, by being conducive to through cell phone client to calculating in mobile phone cell phone client downloaded and installed Machine is verified, and can carry out one-to-one locking to cell phone client and by the computer that the cell phone client unlocks, when Center control holder be tested with computer occur problem when or carry out malfeasance when, corresponding cell phone client can be passed through Informational linkage in interior registration module is to user, the efficiency of the management after improving computer access to LAN.
To achieve the above object, the invention provides the following technical scheme: a kind of computer access to LAN be followed by it is managed Control method, including local area network, center control holder, management software and cell phone client, the management software include key Generation module, authentication module and examination module, the examination module attachment end are connected with logging modle and automatic installation module, institute It states logging modle connecting pin and is connected with backup module, specific steps are as follows:
Step 1: prepare local area network, the computer that center control holder and at least a local area network network;
Step 2: the computer local area network newly to network initiates communication request;
Step 3: center control holder sends management software to the computer newly to network;
Step 4: the computer for being equipped with management software automatically generates a random key by management software;
Step 5: random key is inputted and is entered in mobile phone cell phone client downloaded and installed by user, is led to Row identifying code, and identifying code is input in the management software of computer, so that this computer is obtained networking qualification;
Step 6: the computer for being equipped with management software initiates communication request by local area network;
Step 7: installed examination module on the computer of management software to the computer of communication object whether installing pipe Reason software is screened;
Step 8: when screening module while being screened, logging modle records this behavior, and by information Backup module is transmitted to be backed up;
Step 9: when that screens that module screens out communication object is not installed with management software, to not installing management software Computer is locked, and automatic installation module is sent to it, is installed to management software.
In a preferred embodiment, the key production module for generating key, the authentication module at random For verifying to the verifying that user inputs, there are logging modle and automatic installation mould in the examination module attachment end connecting pin Block.
In a preferred embodiment, in the step 7, screen module be used for the computer communicated into Row is screened, and sees whether be equipped with management software.
In a preferred embodiment, in the step 5, cell phone client includes registration module, password generation mould Block and locking module generate pass authentication code according to the random key that key production module generates at random.
In a preferred embodiment, in the step 9, locking module is used for cell phone client and by being somebody's turn to do The computer of cell phone client unlock carries out one-to-one locking, and when center, control holder is tested with computer generation problem When, user can be related to by corresponding cell phone client.
In a preferred embodiment, the registration module is used to carry out authentication to user and tie up It is fixed, and each cell phone client can only correspond to an effective identity, the auth method includes face recognition, cell-phone number note Volume and identity card registration.
In a preferred embodiment, in the step 8, logging modle connecting pin and backup module connecting pin phase Connection, the logging modle is used to record the examination information for screening module, and information is transmitted to backup module, described standby Part module is used to carry out record to examination information to back up.
In a preferred embodiment, in the step 9, automatic module of installing includes pipeline software installation packet, is used In to computer installation management software.
Technical effect and advantage of the invention:
1, center control holder sends management software to the computer newly to network, and the computer for being equipped with management software passes through Key production module automatically generates a random key, and user, and will be random in mobile phone cell phone client downloaded and installed Key is inputted into secret generation module, obtains pass authentication code by secret generation module, and identifying code is input to verifying In module, so that this computer is obtained networking qualification after, be conducive to verify computer by cell phone client, and locks Cover half block can carry out one-to-one locking to cell phone client and by the computer that the cell phone client unlocks, when center is controlled When holder processed is tested with computer generation problem, user can be related to by corresponding cell phone client, improve meter The efficiency of management after calculation machine access to LAN, and registration module is used to carry out authentication to user and bind, and Each cell phone client can only correspond to an effective identity, the auth method include face recognition, cell-phone number registration and Identity card registration can pass through corresponding cell phone customer when control holder has monitored that computer carries out malfeasance when center The information in registration module in end is quickly found out the installation people of the computer, improves the efficiency of management;
2, having installed examination module on the computer of management software, whether to install management to the computer of communication object soft Part is screened, when screening module while being screened, when that screens that module screens out communication object is not installed with management Software locks the computer for not installing management software, and automatic installation module is sent to it, pacifies to management software Dress is conducive to whether install management to the computer of communication object by the examination module on the computer of having installed management software Software is screened, and is cooperated center control holder to detect the computer newly to network, is effectively increased pushing away for management software Wide installation effectiveness, and this method is independent of hardware or other network equipments, avoid to other equipment and complex environment according to Rely;
3, when screening module while being screened, logging modle records this behavior, and information is transmitted to Backup module is backed up, and backup module can will screen information and back up, and being conducive to the later period is inquired, can also be to two Connection between a computer is recorded.
Detailed description of the invention
Fig. 1 is control flow schematic diagram of the invention.
Fig. 2 is control system architecture schematic diagram of the invention.
Fig. 3 is mobile phone client system flow diagram of the invention.
Fig. 4 is management software system flow diagram of the invention.
Appended drawing reference are as follows: 1 local area network, 2 center control holders, 3 management softwares, 301 key production modules, 302 are tested Demonstrate,prove module, 303 examination modules, 4 cell phone clients, 401 registration modules, 402 secret generation modules, 403 locking modules, 5 Automatic installation module, 6 logging modles, 7 backup modules.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
A kind of computer access to LAN according to shown in Fig. 1-4 is followed by managed control method, including local area network 1, Center control holder 2, management software 3 and cell phone client 4, the management software 3 include key production module 301, verifying mould Block 302 and examination module 303,303 connecting pin of examination module are connected with logging modle 6 and automatic installation module 5, the note Record 6 connecting pin of module is connected with backup module 7, specific steps are as follows:
Step 1: prepare local area network 1, the computer that center control holder 2 and an at least local area network 1 network;
Step 2: the computer local area network 1 newly to network initiates communication request;
Step 3: center control holder 2 sends management software 3 to the computer newly to network;
Step 4: the computer for being equipped with management software 3 automatically generates a random key by management software 3;
Step 5: random key is inputted and is entered in mobile phone cell phone client 4 downloaded and installed by user, is obtained Pass authentication code, and identifying code is input in the management software 3 of computer, so that this computer is obtained networking qualification;
Step 6: the computer for being equipped with management software 3 initiates communication request by local area network 1;
Step 7: whether the examination module 303 installed on the computer of management software 3 pacifies the computer of communication object Dress management software 3 is screened;
Step 8: when screening module 303 while being screened, logging modle 6 records this behavior, and will Information is transmitted to backup module 7 and is backed up;
Step 9: when that screens that module 303 screens out communication object is not installed with management software 3, to not installing, management is soft The computer of part 3 is locked, and automatic installation module 5 is sent to it, is installed to management software 3.
Further, the key production module 301 is used for for generating key, the authentication module 302 at random to making The verifying of user's input is verified, and there are logging modle 6 and automatic installation module 5 in the 303 connecting pin connecting pin of examination module.
Further, in the step 7, module 303 is screened for screening to the computer communicated, seeing is It is no that management software 3 is installed.
Further, in the step 5, cell phone client 4 includes registration module 401, secret generation module 402 and lock Cover half block 403 generates pass authentication code according to the random key that key production module 301 generates at random.
Further, in the step 9, locking module 403 is used for cell phone client 4 and passes through the cell phone client 4 The computer of unlock carries out one-to-one locking, when center, control holder 2 is tested with computer generation problem, can pass through Corresponding cell phone client 4 relates to user.
Further, the registration module 401 is used to carry out authentication to user and bind, and each mobile phone Client 4 can only correspond to an effective identity, and the auth method includes face recognition, cell-phone number registration and identity card note Volume.
Further, in the step 8,6 connecting pin of logging modle is connected with 7 connecting pin of backup module, the record Module 6 is used to record the examination information for screening module 303, and information is transmitted to backup module 7, the backup module 7 It is backed up for carrying out record to examination information.
Further, in the step 9, automatic module 5 of installing includes pipeline software installation packet, for pacifying to computer Fill management software 3.
Working principle of the present invention:
Referring to Figure of description 1-4, the computer local area network 1 newly to network initiates communication request, the computer before networking The monitoring of holder 2 is controlled by center, center control holder 2 sends management software 3 to the computer newly to network, when center is controlled Holder 2 processed monitors that computer newly networks, and is just sent to it management software 3, and management software 3 includes key production module 301, authentication module 302 and examination module 303, the computer for being equipped with management software 3 are generated by the key in management software 3 Module 301 automatically generates a random key, and user wraps in mobile phone cell phone client 4 downloaded and installed, cell phone client 4 Registration module 401, secret generation module 402 and locking module 403 are included, and random key is inputted into secret generation module 402 It is interior, pass authentication code is obtained by secret generation module 402, and identifying code is input to testing in the management software 3 of computer Module 302 is demonstrate,proved, so that this computer is obtained networking qualification after, is conducive to verify computer by cell phone client 4, And locking module 403 can carry out one-to-one lock to cell phone client 4 and by the computer that the cell phone client 4 unlocks Fixed, when center, control holder 2 is tested with computer generation problem, can be related to by corresponding cell phone client 4 makes User, the efficiency of the management after improving computer access to LAN 1, and registration module 401 are used to carry out identity to user It verifies and is bound, and each cell phone client 4 can only correspond to an effective identity, the auth method includes face Identification, cell-phone number registration and identity card registration can be with when center, control holder 2 has monitored that computer carries out malfeasance By the information in the registration module 401 in corresponding cell phone client 4, it is quickly found out the installation people of the computer, is improved The efficiency of management;
Referring to Figure of description 1-4, the computer for being equipped with management software 3 initiates communication request by local area network 1, The examination module 303 installed on the computer of management software 3 is discriminated to whether the computer of communication object installs management software 3 Not, when screening module 303 while being screened, logging modle 6 records this behavior, and information is transmitted to backup Module 7 is backed up, when that screens that module 303 screens out communication object is not installed with management software 3, to not installing management software 3 computer is locked, and automatic installation module 5 is sent to it, and automatic module 5 of installing includes pipeline software installation packet, right Management software 3 is installed, and is conducive to through the examination module 303 on the computer of having installed management software 3 to communication object Computer whether management software 3 be installed screened, cooperate center control holder 2 to detect the computer newly to network, It effectively increases the popularization installation effectiveness of management software 3, and this method is independent of hardware or other network equipments, avoids pair The dependence of other equipment and complex environment, and backup module 7 can will screen information and back up, being conducive to the later period is looked into It askes, the connection between two computers can also be recorded.
Last: the foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, all in the present invention Spirit and principle within, any modification, equivalent replacement, improvement and so on, should be included in protection scope of the present invention it It is interior.

Claims (8)

1. a kind of computer access to LAN is followed by managed control method, it is characterised in that: including local area network (1), center Control holder (2), management software (3) and cell phone client (4), the management software (3) include key production module (301), Authentication module (302) and examination module (303), examination module (303) connecting pin are connected with logging modle (6) and automatic peace Die-filling piece (5), logging modle (6) connecting pin is connected with backup module (7), specific steps are as follows:
Step 1: prepare the computer of local area network (1), center control holder (2) and the networking of an at least local area network (1);
Step 2: the computer local area network (1) newly to network initiates communication request;
Step 3: center control holder (2) sends management software (3) to the computer newly to network;
Step 4: the computer for being equipped with management software (3) automatically generates a random key by management software (3);
Step 5: random key is inputted and is entered in mobile phone cell phone client downloaded and installed (4) by user, is led to Row identifying code, and identifying code is input in the management software (3) of computer, so that this computer is obtained networking qualification;
Step 6: the computer for being equipped with management software (3) initiates communication request by local area network (1);
Step 7: whether the examination module (303) installed on the computer of management software (3) pacifies the computer of communication object Dress management software (3) is screened;
Step 8: when screening module (303) while being screened, logging modle (6) records this behavior, and will Information is transmitted to backup module (7) and is backed up;
Step 9: when that screens that module (303) screen out communication object is not installed with management software (3), to not installing, management is soft The computer of part (3) is locked, and automatic installation module (5) is sent to it, is installed to management software (3).
2. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that: The key production module (301) is used for the verifying inputted to user for generating key, the authentication module (302) at random It is verified.
3. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that: In the step 7, module (303) are screened for screening to the computer communicated, see whether management software is installed (3)。
4. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that: In the step 5, cell phone client (4) includes registration module (401), secret generation module (402) and locking module (403), Pass authentication code is generated at random according to the random key that key production module (301) generate.
5. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that: In the step 9, locking module (403) is used for cell phone client (4) and the calculating unlocked by the cell phone client (4) Machine carries out one-to-one locking, when center control holder (2) is tested with computer, and problem occurs, can pass through corresponding hand Machine client (4) relates to user.
6. a kind of computer access to LAN according to claim 4 is followed by managed control method, it is characterised in that: The registration module (401) is used to carry out authentication to user and bind, and each cell phone client (4) can only be right An effective identity is answered, the auth method includes face recognition, cell-phone number registration and identity card registration.
7. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that: In the step 8, logging modle (6) connecting pin is connected with backup module (7) connecting pin, the logging modle (6) for pair The examination information for screening module (303) is recorded, and information is transmitted to backup module (7), the backup module (7) for pair Examination information carries out record and is backed up.
8. a kind of computer access to LAN according to claim 1 is followed by managed control method, it is characterised in that: In the step 9, installing module (5) automatically includes pipeline software installation packet, for installing management software (3) to computer.
CN201910489401.0A 2019-06-06 2019-06-06 Control method for receiving management after computer accessing local area network Active CN110278112B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910489401.0A CN110278112B (en) 2019-06-06 2019-06-06 Control method for receiving management after computer accessing local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910489401.0A CN110278112B (en) 2019-06-06 2019-06-06 Control method for receiving management after computer accessing local area network

Publications (2)

Publication Number Publication Date
CN110278112A true CN110278112A (en) 2019-09-24
CN110278112B CN110278112B (en) 2022-03-29

Family

ID=67961935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910489401.0A Active CN110278112B (en) 2019-06-06 2019-06-06 Control method for receiving management after computer accessing local area network

Country Status (1)

Country Link
CN (1) CN110278112B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020099940A1 (en) * 2001-01-19 2002-07-25 Jieh-Shan Wang Secure internet applications with mobile code
US20130205293A1 (en) * 2012-02-02 2013-08-08 Sungard Availability Services, Lp Network topology-aware recovery automation
CN105376074A (en) * 2015-12-14 2016-03-02 周海斌 Startup and timing control method and system of client computers in local area network
CN105592021A (en) * 2014-11-12 2016-05-18 成都安慧科技有限公司 Novel internal network security protection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020099940A1 (en) * 2001-01-19 2002-07-25 Jieh-Shan Wang Secure internet applications with mobile code
US20130205293A1 (en) * 2012-02-02 2013-08-08 Sungard Availability Services, Lp Network topology-aware recovery automation
CN105592021A (en) * 2014-11-12 2016-05-18 成都安慧科技有限公司 Novel internal network security protection method
CN105376074A (en) * 2015-12-14 2016-03-02 周海斌 Startup and timing control method and system of client computers in local area network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周霄红: "大中型企业内部局域网非法接入问题的研究", 《行业应用》 *

Also Published As

Publication number Publication date
CN110278112B (en) 2022-03-29

Similar Documents

Publication Publication Date Title
CN101094056B (en) Security system of wireless industrial control network, and method for implementing security policy
US5524052A (en) Communication network access method and system
CN1302634C (en) Network connection system
US9634834B1 (en) Distributed cryptographic management for computer systems
US6678826B1 (en) Management system for distributed out-of-band security databases
CN101751712B (en) Centralized invoice authentication system and authentication method
CN101730094B (en) Method for accessing terminal equipment to service platform of security system and transmitting information
CN105430000A (en) Cloud computing security management system
WO2005033829A2 (en) Centralized network control
CN108966216B (en) Mobile communication method and system applied to power distribution network
CN114866346B (en) Password service platform based on decentralization
CN101345723B (en) Management authentication method and system of client gateway
CN109818774A (en) Automatic sensing asset acquisition device, method and computer readable storage medium
US20040122923A1 (en) Systems and methods for improved multisite management of converged communication systems and computer systems
CN110278112A (en) A kind of computer access to LAN is followed by managed control method
CN114466038B (en) Communication protection system of electric power thing networking
CN101646172B (en) Method and device for generating key in distributed MESH network
CN107317787A (en) Service credit method, equipment and system
CN110460562A (en) A kind of long-range Activiation method of POS terminal and system
CN101442447B (en) Method for implementing authentication proxy in NGN listen-in system and listen-in gateway
CN113672655A (en) File collaborative checking method and device based on block chain
CN102013979A (en) Anti-counterfeiting authentication system
CN106878378B (en) Scatter processing method in network communication management
CN100396046C (en) A method for implementing authorized verification and authorized verification processing module thereof
CN109634723A (en) The communication means for carrying module is deposited in fusion and load module is deposited in fusion

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant