CN111506896A - Watch detection method - Google Patents

Watch detection method Download PDF

Info

Publication number
CN111506896A
CN111506896A CN202010233560.7A CN202010233560A CN111506896A CN 111506896 A CN111506896 A CN 111506896A CN 202010233560 A CN202010233560 A CN 202010233560A CN 111506896 A CN111506896 A CN 111506896A
Authority
CN
China
Prior art keywords
code
digit
key
password
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010233560.7A
Other languages
Chinese (zh)
Other versions
CN111506896B (en
Inventor
关梓立
杨雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Blue Ocean Jiahe Electronic Technology Co ltd
Original Assignee
Guangdong Lemovt Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Lemovt Intelligent Technology Co ltd filed Critical Guangdong Lemovt Intelligent Technology Co ltd
Priority to CN202010233560.7A priority Critical patent/CN111506896B/en
Publication of CN111506896A publication Critical patent/CN111506896A/en
Application granted granted Critical
Publication of CN111506896B publication Critical patent/CN111506896B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G04HOROLOGY
    • G04DAPPARATUS OR TOOLS SPECIALLY DESIGNED FOR MAKING OR MAINTAINING CLOCKS OR WATCHES
    • G04D7/00Measuring, counting, calibrating, testing or regulating apparatus

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Electric Clocks (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to a detection method of a smart watch, which can effectively read the current state of equipment by combining a key password on equipment without a screen, can find more useful information when the equipment has problems, reduces the direction of solving the problems, improves the efficiency of solving the problems, can set the password through a 'vault mode', has the probability of matching the misoperation password of 1/(2 x 9 x 2) =1/5832, and has the probability of entering a basic version long press of 1/2 (namely the previous application of an applicant), so the method is safer and is not easy to be pressed by a user.

Description

Watch detection method
Technical Field
The invention relates to a watch detection method, in particular to a screen-free intelligent watch detection method.
Background
In the prior application CN2020101224950, a method for detecting a screenless smart watch is disclosed, in the actual operation, because the functions of the watch are more and some function codes are simpler, there may be some requests for entering by mistake and detection by mistake in the long-press and short-press operations, that is, when the person who takes the watch is not the detection person, there is also a possibility that the detection step (which can be compared with the engineering mode of the mobile phone) can be entered by long-press.
In the case of banks or other situations where multiple verifications are required, there is a "vault model" that is: one person holds the password of the safe deposit box, and the other person holds the password of the safe deposit box, and the person must enter the room with the safe deposit box through the password of the safe deposit box, so that double verification is realized.
Disclosure of Invention
In view of the above, the present invention provides a method for detecting a wristwatch, which can obtain device internal information through a case of the wristwatch when wireless communication is unavailable, and which can prevent people other than detection people from entering a detection mode.
The specific technical scheme of the invention is as follows:
a method of detection for a smart watch, the method comprising:
presetting an M-bit key function initial password, an N-bit test initial code and N-bit function codes of various functions; all the functional codes and the initial codes have different numbers with the same number; the method comprises the following steps:
k1, carrying out a first operation on the hand table key, and entering a password verification step:
k2, inputting the first digit code of the M digit key function initial password: performing second operation on the watch, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the first digit is equal to the numerical value of the M-digit key function initial password in the digit; carrying out third operation on the watch key;
k3, inputting the code of the second digit of the M-digit key function initial password: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the second digit is equal to the numerical value of the M-digit key function initial password in the digit; carrying out third operation on the watch key;
k4, if M is larger than 2, inputting the codes of all digits after the second digit in sequence, and carrying out the third operation on the hand table keys;
k5, matching the inputted M-bit code with the M-bit key function initial password, if the matching is successful, entering the following detection step of K6, restoring the M-bit code to the M-bit key function initial password and terminating the password verification step; if the matching is unsuccessful, directly restoring the M-bit code number to the M-bit key function initial password and terminating the password verification step;
in the password verification step, in the counting process of the counter, if the number of a certain digit after the counter is increased by 1 is equal to the number of the M-digit key function initial password in the digit, the counter is increased by 1; if the number of the code in a certain digit is 9, the counter is marked as 0 and not carried after being increased by 1, and if the number of the code of the M-digit key function initial password in the digit is 0, the counter is marked as 1 and not carried after being increased by 1.
K6, entering a detection step, said detection step comprising:
s1, inputting the code of the first digit: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the first digit is equal to the numerical value of the function code of the function required to be detected by the user in the digit; carrying out third operation on the watch key;
s2, inputting a second digit code: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the second digit is equal to the numerical value of the function code of the function required to be detected by the user in the digit; carrying out third operation on the watch key;
s3, if the initial code is N digits larger than 2, sequentially inputting codes of all digits after the second digit, and performing a third operation on the hand-table keys;
s4, matching the input N-digit code with the function code, if the matching is successful, the watch executes the function corresponding to the function code, and restores the N-digit code to the initial code and terminates the detection step; if the matching is unsuccessful, directly restoring the N-bit code number to the initial code and terminating the detection step;
in the detecting step, in the counting process of the counter, if the number of a certain number of bits after the counter is increased by 1 is equal to the number of the initial code at the number of the bits, the counter is increased by 1; if the code number of a certain digit is 9, the counter is marked as 0 and not carried after being increased by 1, and if the code number of the initial code of the digit is 0, the counter is marked as 1 and not carried after being increased by 1.
Furthermore, the watch is a single-key watch.
Furthermore, the third operation is long-time pressing of a key.
Further, the long-press key is pressed for a time longer than 2 seconds.
Further, the first operation and the second operation are short-press keys.
Further, the second operation is a short press for more than 0.2 seconds and less than 2 seconds.
Further, in the password verification step or the detection step, if the time duration between any two times of key operations of the watch is longer than 5 seconds, the M-bit code number is directly restored to the M-bit key function initial password, the N-bit code number is directly restored to the N-bit test initial code, and the password verification step or the detection step is terminated.
By the mode, on equipment without a screen, the current state of the equipment can be effectively read by a method of combining the key passwords, when the equipment has a problem, more useful information can be found, the direction of solving the problem is reduced, the efficiency of solving the problem is improved, in addition, the passwords can be set through a 'vault mode', the probability that the misoperation passwords can be matched is 1/(2 9 2) =1/5832, and the probability that the basic version long press enters is 1/2 (namely the previous application of the applicant), so the method is safer, and the user can not easily press the passwords.
Drawings
FIG. 1 is a flow chart of an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are a part of the embodiments of the present invention, but not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, and "a" and "an" generally include at least two, but do not exclude at least one, unless the context clearly dictates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a commodity or system that includes the element.
Sometimes, the condition that Bluetooth cannot be connected exists in the screen-free watch, and at this time, a user cannot acquire information of the watch by Bluetooth binding with the watch. For a watch with a fault, once the Bluetooth binding fails, an operator or a developer has no way to start to detect the watch. In the prior art, except that a watch provided with a USB interface can be judged through a mobile terminal, a developer does not have any relevant solution at present for watches without screens (users cannot interact with the screens) and USB interfaces (no way to connect with terminals such as computers and the like).
The invention aims to provide a method for detecting various items of internal information of equipment under the conditions that no screen is provided, only keys are pressed, and wireless communication is unavailable. And in a manner similar to the function of a vault, other people except the detection personnel cannot enter the detection step.
As shown in fig. 1, the initial password of the 3-digit key function is 000, the initial password is pressed for a short time, the step ② is performed to tell that the device is going to input the first password a next, the short pressing is performed, a is increased by 1, the step ② is performed after the addition is completed, the step a is increased by 1 again, the step ② is performed again, the step ③ is performed to tell that the first password X is confirmed, the device is to wait for the input of the second password B, the step ④ B is increased by 1 after the addition is completed, the step ③ is performed after the addition is performed again, the step ④ B is increased by 1 again after the long pressing is performed to tell that the first password X is confirmed, the step ③ is performed after the addition is completed, the step 850 is performed to tell that the device is confirmed after the second password B is confirmed, the step Z is performed to wait for the input of the third password Z, the short pressing is performed again, the step ② C is increased by 1, the step ② is performed after the second password B is confirmed, the step ⑥ C1 is performed, the step ⑤ is performed again, the step 583 is performed again, the step ② is performed after the initial password is completed, the step 3 is performed again, the step ② is performed, the step is performed again, the step 3 is performed again, the step is performed, the step ② is performed, the step is performed again, the.
The function codes and initial codes of various functions of the watch are preset, wherein the function codes and the initial codes are preferably 3 digits, and the initial codes are preferably 000.
Entering step ⑨, telling the device that the first password X is to be input next, pressing for a short time, entering step ⑩ X plus 1, returning to step ⑨ after the addition is completed, pressing for a short time again, entering step ⑩, adding X plus 1, returning to step ⑨ after the addition is completed, pressing for a long time, entering step ⑪, telling the device that the first password X is confirmed, waiting for the second password Y to be input, pressing for a short time, entering step ⑫ Y plus 1, returning to step ⑪ after the addition is completed, pressing for a short time, entering step ⑫ Y plus 1, returning to step ⑪ after the addition is completed, pressing for a long time, entering step ⑩ after the second password Y is confirmed, telling the device that the second password Y is confirmed, waiting for the third password Z to be input, pressing for a short time, entering step ⑩ Z plus 1, returning to step ⑩ after the addition is completed, pressing for a short time again, entering step 633Z 1, returning to step ⑩ after the key is added, entering step Z2Z plus 1 after the step 6865, returning to step 366, and returning to step 367, if the password matching is completed, and if the password matching is completed, the password is completed.
Each time short press and long press, the program will be recorded, until the corresponding password combination is satisfied, the corresponding test function will not be executed, so the function can be added without affecting the normal use of the client.
The method is described in detail below with respect to several functions (detection steps).
Example one
The function is for obtaining the state that the bluetooth is connected, because the wrist-watch does not have the connection status of screen display bluetooth, at this moment, the user can't know whether the bluetooth of wrist-watch has connected.
The functions are as follows: and acquiring the Bluetooth connection state.
The initial code 000 is preset.
Function code for bluetooth connection status 321.
The detection method comprises the following steps:
initializing password 000, entering detection step ⑨, pressing the key for 3 times in short, the first password X being 3, pressing the key for 3 times in long after confirming the first password, entering step ⑪, pressing the key for 2 times in short, the second password Y being 2, pressing the key for 3 times in long after confirming the second password, entering step ⑬, pressing the key for 1 time in short, the third password Z being 1, pressing the key for 1 time in long again after confirming the third password, entering step ⑮, confirming that the third password is input completely, jumping to step ⑯ because the input password is matched with the function code 321 stored in the program in advance, successfully matching, executing step ⑰, if the Bluetooth is connected, rotating the pin counterclockwise for 1 turn, if the Bluetooth is not connected, rotating the pin clockwise for 2 turns, the tester knows that the current Bluetooth state of the device is disconnected, and after the pin is rotated completely, jumping back to step ①, recovering the input password being 000, and the way of executing the function of the test process can be customized.
Example two
Function name: and acquiring the percentage of the electric quantity.
Initial code: 000; function code: 411.
As a result: the functions performed after matching are ten times 30 degrees of the hour hand rotation electric quantity (the size between every two scale marks is 30 degrees), and one time 30 degrees of the minute hand rotation electric quantity.
Initializing the password to 000, entering step ⑨, pressing the key for 4 times in short, the first password X being 4, pressing the key for long after confirming the first password, entering step ⑪, pressing the key for 1 time in short, the second password Y being 1, pressing the key for long after confirming the second password, entering step ⑬, pressing the key for 1 time in short, the third password Z being 1, pressing the key for long again after confirming the third password, entering step ⑮, confirming that the third password has been determined to have been input, jumping to step ⑯ because the input password matches with the password "411" stored in the program in advance, and executing step ⑰, if the power is 98%, rotating the hour hand for 270 ° (9X 30 °), rotating the minute hand for 240 ° (8X 30 °), the tester can obtain the power percentage according to the rotation angle of the hour hand and the minute hand, and when the hand has been rotated, completing the function execution, jumping to step ①, and recovering the input password to 000.
EXAMPLE III
Function name: and setting a factory restoration function.
An initial code 111; password: 999.
As a result: the function executed after matching is that the hour hand and the minute hand rotate for one circle at the same time and represents the successful factory restoration.
The procedure is that the initial password is 000, step ⑨ is entered, then the key is pressed for 8 times for a short time, at this time the first password X is 9, the long press is entered into step ⑪ after the first password is confirmed, at this time the key is pressed for 8 times for a short time, at this time the second password Y is 9, the long press is entered into step ⑬ after the second password is confirmed, at this time the key is pressed for 8 times for a short time, at this time the third password Z is 9, the long press is again entered after the third password is confirmed, step ⑮ is entered, it is confirmed that the third password is input completely, since 3 passwords are filled, step ⑯ is skipped, since the entered password matches with the password "999" stored in the program in advance, step ⑰ is successfully performed, the program will resume the flow of factory function, rotate a circle, tell the tester that the password is pressed successfully and confirm that the flow is completed, when the pin is rotated, the function is restarted, step ① is skipped, and the entered password is restored to 000.
Example four
In the counting process of the counter, if the number of codes is already 9 in the accumulation process of the counter, at this time, 1 is added, theoretically, the number of codes is changed into 0 and advances by 1, however, the method is not simple counting, and needs code number matching, the number of codes of each digit is independent, and the conditions of carry and bit reduction do not exist, so that the method is specially set to change from 9 to 0 and cannot advance by 1;
meanwhile, just because the code number matching is needed, the condition that the code number of the functional code at a certain bit number is equal to the code number of the initial code is not allowed to exist, namely if the code number of the certain bit number is equal to the code number of the initial code at the bit number after the counter is increased by 1, the counter is increased by 1; therefore, in the counting process, assuming that the initial code is 1, the counting process is repeated for 2, 3, 4, 5, 6, 7, 8, 9, 0, 2, the number of values in each counting period is 9, but not 10, and the number value of the initial code in the number of bits is skipped in the counting process.
If the initial code of a certain number of bits is 0, if the number of codes is already 9, the number is increased by 1 again, the number should be changed to 0 without carry, but since 0 is the initial code, the number of the initial code needs to be increased by 1 again to 1, and 0 is skipped.
After 1 is added, the code number of a certain bit number is equal to the code number of the initial code in the bit number, and then the counter is added by 1; if the code number of a certain digit is 9, the counter is marked as 0 and not carried after being increased by 1, and if the code number of the initial code of the digit is 0, the counter is marked as 1 and not carried after being increased by 1.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A method of detecting a watch, the method comprising:
presetting an M-bit key function initial password, an N-bit test initial code and N-bit function codes of various functions; all the functional codes and the initial codes have different numbers with the same number; the method comprises the following steps:
k1, carrying out a first operation on the hand table key, and entering a password verification step:
k2, inputting the first digit code of the M digit key function initial password: performing second operation on the watch, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the first digit is equal to the numerical value of the M-digit key function initial password in the digit; carrying out third operation on the watch key;
k3, inputting the code of the second digit of the M-digit key function initial password: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the second digit is equal to the numerical value of the M-digit key function initial password in the digit; carrying out third operation on the watch key;
k4, if M is larger than 2, inputting the codes of all digits after the second digit in sequence, and carrying out the third operation on the hand table keys;
k5, matching the inputted M-bit code with the M-bit key function initial password, if the matching is successful, entering the following detection step of K6, restoring the M-bit code to the M-bit key function initial password and terminating the password verification step; if the matching is unsuccessful, directly restoring the M-bit code number to the M-bit key function initial password and terminating the password verification step;
in the password verification step, in the counting process of the counter, if the number of a certain digit after the counter is increased by 1 is equal to the number of the M-digit key function initial password in the digit, the counter is increased by 1; if the number of the code in a certain digit is 9, the counter is marked as 0 and not carried after being increased by 1, and if the number of the code of the M-digit key function initial password in the digit is 0, the counter is marked as 1 and not carried after being increased by 1.
K6, entering a detection step, said detection step comprising:
s1, inputting the code of the first digit: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the first digit is equal to the numerical value of the function code of the function required to be detected by the user in the digit; carrying out third operation on the watch key;
s2, inputting a second digit code: performing second operation on the watch key, wherein each time the second operation is performed, the digit of the current initial code of the counter is increased by 1 until the code of the second digit is equal to the numerical value of the function code of the function required to be detected by the user in the digit; carrying out third operation on the watch key;
s3, if the initial code is N digits larger than 2, sequentially inputting codes of all digits after the second digit, and performing a third operation on the hand-table keys;
s4, matching the input N-digit code with the function code, if the matching is successful, the watch executes the function corresponding to the function code, and restores the N-digit code to the initial code and terminates the detection step; if the matching is unsuccessful, directly restoring the N-bit code number to the initial code and terminating the detection step;
in the detecting step, in the counting process of the counter, if the number of a certain number of bits after the counter is increased by 1 is equal to the number of the initial code at the number of the bits, the counter is increased by 1; if the code number of a certain digit is 9, the counter is marked as 0 and not carried after being increased by 1, and if the code number of the initial code of the digit is 0, the counter is marked as 1 and not carried after being increased by 1.
3. The method of claim 1, wherein the watch is a one-button watch.
4. The method of claim 1, wherein the third operation is a long press of a key.
5. The method of claim 3, wherein the long press key is a long press for greater than 2 seconds.
6. The method of claim 1, wherein the first operation and the second operation are short presses of a key.
7. The method of claim 5, wherein the second operation is a short press for greater than 0.2 seconds and less than 2 seconds.
8. The method according to claim 1, wherein in the password verification step or the detection step, if the time duration between any two wrist watch key operations is longer than 5 seconds, the M-bit code number is directly restored to the M-bit key function initial password, the N-bit code number is directly restored to the N-bit test initial code, and the password verification step or the detection step is terminated.
CN202010233560.7A 2020-03-30 2020-03-30 Watch detection method Active CN111506896B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010233560.7A CN111506896B (en) 2020-03-30 2020-03-30 Watch detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010233560.7A CN111506896B (en) 2020-03-30 2020-03-30 Watch detection method

Publications (2)

Publication Number Publication Date
CN111506896A true CN111506896A (en) 2020-08-07
CN111506896B CN111506896B (en) 2023-06-16

Family

ID=71877888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010233560.7A Active CN111506896B (en) 2020-03-30 2020-03-30 Watch detection method

Country Status (1)

Country Link
CN (1) CN111506896B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017088529A1 (en) * 2015-11-26 2017-06-01 惠州Tcl移动通信有限公司 Mobile terminal-based encryption method for bluetooth watch and bluetooth watch
CN106846555A (en) * 2016-12-12 2017-06-13 国网北京市电力公司 Cipher-code input method, device and smart lock
CN110197063A (en) * 2019-05-22 2019-09-03 努比亚技术有限公司 Cipher-code input method, wearable device and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017088529A1 (en) * 2015-11-26 2017-06-01 惠州Tcl移动通信有限公司 Mobile terminal-based encryption method for bluetooth watch and bluetooth watch
CN106846555A (en) * 2016-12-12 2017-06-13 国网北京市电力公司 Cipher-code input method, device and smart lock
CN110197063A (en) * 2019-05-22 2019-09-03 努比亚技术有限公司 Cipher-code input method, wearable device and computer readable storage medium

Also Published As

Publication number Publication date
CN111506896B (en) 2023-06-16

Similar Documents

Publication Publication Date Title
CN101432980B (en) Time sync-type otp generation device and method for mobile phones
CN103150525B (en) Password input method and password input terminal
CN102929542A (en) Intelligent terminal unlocking method and device
WO2014099816A1 (en) Method and apparatus for information verification
EP1292870B1 (en) Information service terminal
CN109816381B (en) Payment method of intelligent watch and intelligent watch
CN111506896A (en) Watch detection method
CN103780388A (en) Dynamic token seed key self-help update method and system
CN103209077A (en) Unlocking method applicable to dynamic token
CN103312508A (en) Working method of dynamic token
CN111240182B (en) Detection method of screen-free intelligent watch
JP4490637B2 (en) Personal authentication terminal
JP6711341B2 (en) Attendance attendance registration device, attendance attendance registration method and program
CN105975194A (en) Factory settings restoration method and apparatus
CN111812962B (en) Digital input method of smart watch
CN111796732A (en) Method for inputting numbers into watch and unbinding watch
CN111736450B (en) Intelligent watch
CN112435117A (en) Loan overdue case collection method and device, electronic equipment and storage medium
CN201440660U (en) Dynamic token with function of dealing
JP2005251013A (en) Terminal device of arrival and leaving work management system, program and recording medium for the same
JPH0778783B2 (en) Handler authentication system
CN210271208U (en) Fee-control handheld meter reading terminal based on biological characteristic authentication
JPS63265361A (en) Collation system for credit card
CN114115683A (en) Smart watch control method and device, smart watch and storage medium
CN114417317A (en) Dynamic verification stop-and-repeat system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210621

Address after: 510000 6 jiahuiyuan, Xintang New World garden, Zengcheng District, Guangzhou City, Guangdong Province

Applicant after: Yu Xiyun

Address before: Room 235, No. 333, jiufo Jianshe Road, Zhongxin Guangzhou Knowledge City, Guangzhou, Guangdong 510000

Applicant before: GUANGDONG LEMOVT INTELLIGENT TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230517

Address after: 1108B, Feiyada Science and Technology Building, No. 002, Gaoxin South 1st Road, High tech Zone Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong 518000

Applicant after: Shenzhen Blue Ocean Jiahe Electronic Technology Co.,Ltd.

Address before: 510000 6 jiahuiyuan, Xintang New World garden, Zengcheng District, Guangzhou City, Guangdong Province

Applicant before: Yu Xiyun

GR01 Patent grant
GR01 Patent grant