CN112182549B - Security control master control method, system and storage medium thereof - Google Patents

Security control master control method, system and storage medium thereof Download PDF

Info

Publication number
CN112182549B
CN112182549B CN202011027055.3A CN202011027055A CN112182549B CN 112182549 B CN112182549 B CN 112182549B CN 202011027055 A CN202011027055 A CN 202011027055A CN 112182549 B CN112182549 B CN 112182549B
Authority
CN
China
Prior art keywords
user terminal
database
user
authority
short
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011027055.3A
Other languages
Chinese (zh)
Other versions
CN112182549A (en
Inventor
周清波
周肃
李进福
张大勇
张海焦
刘鹏
文士杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Borui Weixin Technology Co ltd
Original Assignee
Beijing Borui Weixin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Borui Weixin Technology Co ltd filed Critical Beijing Borui Weixin Technology Co ltd
Priority to CN202011027055.3A priority Critical patent/CN112182549B/en
Publication of CN112182549A publication Critical patent/CN112182549A/en
Application granted granted Critical
Publication of CN112182549B publication Critical patent/CN112182549B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The application relates to a security control main control method, a security control main control system and a storage medium thereof, wherein the security control main control method comprises the following steps: receiving an operation request, wherein the operation request is provided with a user identification code and is used for entering a database; when an operation request is received, a short-distance connection request is sent out, wherein the short-distance connection request is used for pairing the user side sending the operation request in a short distance; and according to the user identification code, allowing the user terminal to enter the database when the user terminal is successfully paired with the user terminal which sends the operation request in a short distance. Has the function of preventing the operator from viewing the using process of the controller remotely.

Description

Security control master control method, system and storage medium thereof
Technical Field
The present application relates to the field of information security, and in particular, to a security control master control method, system and storage medium thereof.
Background
With the rapid development of the multimedia video industry, the large-screen spliced display wall is widely applied to various fields, and the spliced controller plays an important role in the process. While the above functions are all needed to be solved by the control end, it can be seen that the "control" plays a very important role in the system.
In the related art, in order to enable an operator to check the use process of the controller and manage the operation authority of the controller, a two-dimensional code is attached to a shell of the controller, the operator can sweep the two-dimensional code through mobile equipment such as a mobile phone and the like, and then the two-dimensional code enters a database to check the use process and manage the authority.
Aiming at the related technology, the inventor considers that the operation process can be stored in a photographing mode, so that an operator can check the use process anytime and anywhere, but the operator is not allowed to check anytime and anywhere due to the privacy of the use process of the controller.
Disclosure of Invention
In order to prevent an operator from viewing the using process of the controller remotely, the application provides a security control master control method, a security control master control system and a storage medium thereof.
In a first aspect, the present application provides a security control master control method, which adopts the following technical scheme:
a security control master control method, the method comprising the steps of:
receiving an operation request, wherein the operation request is provided with a user identification code and is used for entering a database; when an operation request is received, a short-distance connection request is sent out, wherein the short-distance connection request is used for pairing the user side sending the operation request in a short distance; and according to the user identification code, allowing the user terminal to enter the database when the user terminal is successfully paired with the user terminal which sends the operation request in a short distance.
By adopting the technical scheme, the user side is determined to be positioned near the controller by short-distance pairing, and the user side is allowed to enter the database, so that the user side is prevented from remotely operating the database.
Optionally, after the pairing with the user terminal sending the operation request is successful, before the user terminal enters the database: judging whether the user identification code is in a preset user authority library, if so, enabling the user terminal corresponding to the user identification code to enter the database, and otherwise, disabling the user terminal corresponding to the user identification code from entering the database.
By adopting the technical scheme, the authority of the user terminal is verified through the user authority library, and only the user terminal in the user authority library can enter the database, so that the condition that other people operate the database to steal data is avoided.
Optionally, after the user terminal enters the database, judging whether the user terminal is disconnected in the short distance pairing, if so, the user terminal cannot enter the database.
By adopting the technical scheme, after the user end leaves the controller for a certain distance, the short-distance pairing is disconnected, and the user end is withdrawn from the database at the moment, so that the remote operation of the user end is avoided.
Optionally, after the short-distance pairing of the user terminal is judged to be disconnected, judging whether the user terminal is paired again within a preset time range, if so, the user terminal can enter the database.
By adopting the technical scheme, when the user side leaves the controller and returns to the controller in a short time, the user side can directly enter the database within a preset time range without resending the operation request in order to avoid inconvenience caused by repeated requests to the user side.
Optionally, after the pairing with the user end sending the operation request is successful in a short distance, searching the operation authority corresponding to the user identification code in a preset multi-level authority library according to the user identification code, wherein the operation authority comprises a primary authority and a secondary authority, the primary authority has a use process checking authority, and the secondary authority has a use process checking authority, a use process downloading authority and an authority management function.
By adopting the technical scheme, as different personnel are matched with different authorities according to job level requirements, the first-level authorities and the second-level authorities are set, so that the personnel of different job levels have different operation authorities.
Optionally, after the user terminal with the second-level authority enters the database, the user terminal with the second-level authority can increase or decrease the user identification code in the first-level authority in the multi-level authority library.
By adopting the technical scheme, the secondary authority can increase or decrease the personnel of the primary authority.
Optionally, after the user terminal with the second-level authority enters the database, when the user terminal with the first-level authority enters the database, a prompt signal is sent out, and the prompt signal is used for informing that the user terminal with the second-level authority has the user terminal with the first-level authority to enter the database.
By adopting the technical scheme, the user terminal of the second-level authority can know the personnel of the user terminal of the first-level authority which enters the database at present, and when the user terminal of the first-level authority which enters the database is considered not to enter the database for viewing, the user terminal of the second-level authority can delete the user identification code of the user terminal of the first-level authority in the multi-level authority library directly, so that the user terminal of the first-level authority is prevented from entering the database.
In a second aspect, the present application provides a security control master control system, which adopts the following technical scheme:
a security control master control system, the system comprising:
the receiving module is used for receiving an operation request, wherein the operation request is provided with a user identification code and is used for entering a database;
the short-distance pairing module is used for sending a short-distance connection request when receiving an operation request, wherein the short-distance connection request is used for pairing the user side sending the operation request;
and the permission module is used for allowing the user terminal to enter the database according to the user identification code when the user terminal is successfully paired with the user terminal which sends the operation request in a short distance.
In a third aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer readable storage medium storing a computer program which when executed by a processor implements the steps of the security control master control method described above.
In summary, the present application includes at least one of the following beneficial technical effects:
1. by short-distance pairing, the user side is determined to be located near the controller and is allowed to enter the database, so that the user side is prevented from remotely operating the database.
2. When the user side leaves the controller and returns to the controller in a short time, the user side can directly enter the database within a preset time range without resending the operation request in order to avoid inconvenience caused by repeated requests.
Drawings
FIG. 1 is a flow chart of a method for controlling a master control method for security according to an embodiment of the present application;
fig. 2 is a system block diagram of a security control master control system according to an embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to fig. 1-2.
The embodiment of the application discloses a security control master control method. Referring to fig. 1, the security control master control method includes the steps of:
an operation request is received, the operation request having a user identification code, the operation request being for entry into a database.
In the embodiment of the application, the operation request is indirectly received by the controller through the cloud, the two-dimensional code is attached to the controller, and the mobile equipment of the user side scans the two-dimensional code to generate the operation request. The data of the controller are stored in the cloud end and are not stored locally, so that the controller is prevented from being stolen, the data are prevented from being stolen, and the data of the controller are uploaded to the cloud end through remote communication. Therefore, if the user end needs to log in the database, the user end needs to send an operation request to the cloud end through remote communication, such as ethernet communication. The user identification code is used as a unique identification code for the user side to confirm the identity of the user side so as to authenticate the authority of the user side.
When receiving the operation request, sending out a short-distance connection request, wherein the short-distance connection request is used for pairing the user end sending out the operation request.
In embodiments of the present application, the short-range connection may be achieved by short-range communication, such as bluetooth, infrared connection, etc. In the embodiments of the present application, short-range communication is hereinafter exemplified by bluetooth. After receiving the operation request, the cloud sends an instruction to the control, so that the control sends a Bluetooth pairing request, the Bluetooth pairing request is only used for requesting to pair the user side sending the operation request, and the user side sending the operation request is determined by the user identification code of the user side.
And according to the user identification code, allowing the user terminal to enter the database when the user terminal is successfully paired with the user terminal which sends the operation request in a short distance.
In the embodiment of the application, when the controller and the user terminal Bluetooth are successfully paired, that is, the user terminal equipment is proved to be nearby the controller, the user terminal can enter the database. The user side entering the database can check the use process, the download use process and the authority management of the controller. In some embodiments, after the user side leaves the controller, the bluetooth pairing is disconnected, so as to avoid that the user side can still view the use process of the controller in the database at a remote location, and when the bluetooth is disconnected, the controller sends an instruction to the cloud end to disconnect the access of the user side to the database.
In some embodiments, since a person holding the mobile device of the ue may walk to cause a short bluetooth pairing with the controller, the ue needs to perform the code scanning sending operation again, so as to avoid the trouble of repeated operations for the user of the ue, determine whether the ue is paired again within a preset time range after the short-distance pairing of the ue is disconnected, and if so, the ue may enter the database.
In some embodiments, to avoid non-relevant personnel entering the database, a user authority library is stored in the controller, and a user identification code of a user end capable of entering the database is stored in the user authority library, wherein the user identification code is used as a unique identification code of the user end and is used for distinguishing the user end capable of entering the database from the user end incapable of entering the database. After the short-distance pairing with the user terminal sending the operation request is successful, before the user terminal enters the database, judging whether the user terminal user identification code sending the operation request is in a preset user authority database, if so, enabling the user terminal corresponding to the user identification code to enter the database, and otherwise, enabling the user terminal corresponding to the user identification code not to enter the database.
In some embodiments, since operators of different job levels should match different rights, a multi-level rights library is preset in the controller, in the multi-level rights library, two-level rights are matched according to the job level of the user to the user identification code of the user at the high job level, and one-level rights are matched to the user identification code of the user at the low job level. The first-level authority only has the use process viewing authority, and the second-level authority has the use process viewing authority, the use process downloading authority and the authority management function. In some embodiments, more levels of permissions may be set, as well as different operational functions for the more levels of permissions, as desired.
In some embodiments, the user side authority management function of the second level authority can increase or decrease the user identification code in the first level authority in the multi-level authority library, so as to manage the user side of the first level authority. In some embodiments, when the user terminal with the second level authority enters the database, the cloud end may send a prompt message to the user terminal with the second level authority, where the prompt signal is used to inform that the user terminal with the second level authority has the user terminal with the first level authority enter the database. At this time, if the user terminal of the second level authority considers that the user terminal of the first level authority should not enter the database before, the user terminal of the second level authority can delete the user identification code of the user terminal of the first level authority in the multi-level authority library, and the user terminal of the first level authority can not access the database immediately.
In some embodiments, after the user terminal enters the database, starting to count as the operation duration, and judging whether the operation duration exceeds a preset duration threshold, if so, the user terminal cannot enter the database. So as to avoid improper operation of the user side by accessing the database for a long time.
The embodiment of the application also discloses a safety control main control system which corresponds to the safety control main control method in the embodiment one by one. Referring to fig. 2, the security control master control system includes a receiving module, a short-range pairing module, and a grant module. The detailed description of each module is as follows:
the receiving module is used for receiving an operation request, wherein the operation request is provided with a user identification code and is used for entering a database;
the short-distance pairing module is used for sending out a short-distance connection request when receiving an operation request, wherein the short-distance connection request is used for pairing the user end sending out the operation request;
and the permission module is used for allowing the user terminal to enter the database according to the user identification code when the user terminal is successfully paired with the user terminal which sends the operation request in a short distance.
The embodiment of the application also discloses a computer readable storage medium, which stores a computer program, and the computer program realizes the following steps when being executed by a processor:
receiving an operation request, wherein the operation request is provided with a user identification code and is used for entering a database;
when an operation request is received, a short-distance connection request is sent out, and the short-distance connection request is used for pairing the user side sending out the operation request;
and according to the user identification code, allowing the user terminal to enter the database when the user terminal is successfully paired with the user terminal which sends the operation request in a short distance.
The above embodiments are not intended to limit the scope of the present application, so: all equivalent changes in structure, shape and principle of the application should be covered in the scope of protection of the application.

Claims (7)

1. A security control master control method is characterized in that: the method comprises the following steps:
receiving an operation request, wherein the operation request is provided with a user identification code and is used for entering a database;
when an operation request is received, a short-distance connection request is sent out, wherein the short-distance connection request is used for pairing the user side sending the operation request in a short distance;
according to the user identification code, when the user terminal is successfully paired with the user terminal sending the operation request in a short distance, allowing the user terminal to enter a database;
after the user terminal enters the database, judging whether the user terminal is disconnected in the short-distance pairing, if so, the user terminal cannot enter the database, and after judging that the short-distance pairing of the user terminal is disconnected, judging whether the user terminal is paired again in a preset time range, if so, the user terminal can enter the database;
after the short-distance pairing with the user terminal sending the operation request is successful, before the user terminal enters a database: judging whether the user identification code is in a preset user authority library, if so, enabling the user terminal corresponding to the user identification code to enter the database, and otherwise, disabling the user terminal corresponding to the user identification code from entering the database.
2. The security control master control method according to claim 1, wherein: after the user terminal sending the operation request is successfully paired with a short distance, according to the user identification code, searching an operation authority corresponding to the user identification code in a preset multi-level authority library, wherein the operation authority comprises a primary authority and a secondary authority, the primary authority has a use process checking authority, and the secondary authority has a use process checking authority, a use process downloading authority and an authority management function.
3. The security control master control method according to claim 2, wherein: when the user terminal with the second-level authority enters the database, the user terminal with the second-level authority can increase or decrease the user identification code in the first-level authority in the multi-level authority library.
4. The security control master control method according to claim 2, wherein: when the user terminal with the second-level authority enters the database, the user terminal with the first-level authority enters the database, a prompt signal is sent out, and the prompt signal is used for informing the user terminal with the second-level authority that the user terminal with the first-level authority enters the database.
5. The security control master control method according to claim 2, wherein: when the user side enters the database, starting timing to serve as operation duration, judging whether the operation duration exceeds a preset duration threshold, and if yes, the user side cannot enter the database.
6. A security control master control system, the system comprising:
the receiving module is used for receiving an operation request, wherein the operation request is provided with a user identification code and is used for entering a database;
the short-distance pairing module is used for sending a short-distance connection request when receiving an operation request, wherein the short-distance connection request is used for pairing the user side sending the operation request;
the permission module is used for allowing the user terminal to enter the database when the user terminal sending the operation request is successfully paired with the user terminal in a short distance according to the user identification code;
after the user terminal enters the database, the receiving module judges whether the user terminal is disconnected in the short-distance pairing, if so, the user terminal cannot enter the database, and after the receiving module judges that the short-distance pairing of the user terminal is disconnected, the receiving module judges whether the user terminal is paired again in a preset time range, if so, the user terminal can enter the database;
after the short-distance pairing with the user terminal sending the operation request is successful, before the user terminal enters a database: the receiving module judges whether the user identification code is in a preset user authority library, if the receiving module judges that the user identification code is in the preset user authority library, the permission module allows the user terminal corresponding to the user identification code to enter the database, and if the receiving module judges that the user identification code is not in the preset user authority library, the permission module allows the user terminal corresponding to the user identification code to not enter the database.
7. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the safety control master method according to any one of claims 1 to 5.
CN202011027055.3A 2020-09-25 2020-09-25 Security control master control method, system and storage medium thereof Active CN112182549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011027055.3A CN112182549B (en) 2020-09-25 2020-09-25 Security control master control method, system and storage medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011027055.3A CN112182549B (en) 2020-09-25 2020-09-25 Security control master control method, system and storage medium thereof

Publications (2)

Publication Number Publication Date
CN112182549A CN112182549A (en) 2021-01-05
CN112182549B true CN112182549B (en) 2023-10-27

Family

ID=73945003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011027055.3A Active CN112182549B (en) 2020-09-25 2020-09-25 Security control master control method, system and storage medium thereof

Country Status (1)

Country Link
CN (1) CN112182549B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003308371A (en) * 2002-04-17 2003-10-31 Tadashi Goino Physical distribution management method, physical distribution management system, and shipping tag
KR20140127987A (en) * 2013-04-26 2014-11-05 에스케이플래닛 주식회사 System and method for public terminal security
CN104469662A (en) * 2014-12-15 2015-03-25 王家城 Automated communication switching method and equipment among multiple mobile communication terminals
CN106558129A (en) * 2016-10-25 2017-04-05 武汉盛硕电子有限公司 The intelligent entrance guard and attendance checking system of short-distance wireless communication and control method
KR20180057855A (en) * 2016-11-23 2018-05-31 엘에스웨어(주) System for management database and method thereof
CN207473750U (en) * 2017-10-09 2018-06-08 广州汇智智能科技有限公司 A kind of detachable Intelligent storage cabinet
WO2018107617A1 (en) * 2016-12-12 2018-06-21 华为技术有限公司 Permission management method, related device, and system
CN109005530A (en) * 2018-08-01 2018-12-14 飞天诚信科技股份有限公司 A kind of method and bluetooth equipment with mobile terminal execution pairing service
CN109729512A (en) * 2019-03-19 2019-05-07 深圳创维数字技术有限公司 A kind of Bluetooth pairing methods, device, terminal and storage medium
CN109829286A (en) * 2018-12-21 2019-05-31 航天信息股份有限公司 A kind of user authority management system and method for WEB application
CN110047219A (en) * 2019-04-17 2019-07-23 谢财滨 A kind of control system and control method of shared washing machine
CN110062366A (en) * 2019-04-18 2019-07-26 深圳创维数字技术有限公司 Bluetooth pairing abnormality eliminating method, equipment, storage medium and device
CN110139180A (en) * 2019-04-08 2019-08-16 努比亚技术有限公司 Progress control method, device and computer readable storage medium
CN112181144A (en) * 2020-09-25 2021-01-05 北京博睿维讯科技有限公司 Terminal control method and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6950944B2 (en) * 2000-12-18 2005-09-27 David Frank Yager Security code activated access control system
JP4568537B2 (en) * 2004-05-31 2010-10-27 株式会社ソニー・コンピュータエンタテインメント Server device, content processing device, content processing system, content transmission method, content processing program, and recording medium
US20120291103A1 (en) * 2011-05-09 2012-11-15 Google Inc. Permission-based administrative controls
KR20170098105A (en) * 2016-02-19 2017-08-29 삼성전자주식회사 Electronic apparatus having authentication module and method for authenticating user by controlling authentication module

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003308371A (en) * 2002-04-17 2003-10-31 Tadashi Goino Physical distribution management method, physical distribution management system, and shipping tag
KR20140127987A (en) * 2013-04-26 2014-11-05 에스케이플래닛 주식회사 System and method for public terminal security
CN104469662A (en) * 2014-12-15 2015-03-25 王家城 Automated communication switching method and equipment among multiple mobile communication terminals
CN106558129A (en) * 2016-10-25 2017-04-05 武汉盛硕电子有限公司 The intelligent entrance guard and attendance checking system of short-distance wireless communication and control method
KR20180057855A (en) * 2016-11-23 2018-05-31 엘에스웨어(주) System for management database and method thereof
WO2018107617A1 (en) * 2016-12-12 2018-06-21 华为技术有限公司 Permission management method, related device, and system
CN207473750U (en) * 2017-10-09 2018-06-08 广州汇智智能科技有限公司 A kind of detachable Intelligent storage cabinet
CN109005530A (en) * 2018-08-01 2018-12-14 飞天诚信科技股份有限公司 A kind of method and bluetooth equipment with mobile terminal execution pairing service
CN109829286A (en) * 2018-12-21 2019-05-31 航天信息股份有限公司 A kind of user authority management system and method for WEB application
CN109729512A (en) * 2019-03-19 2019-05-07 深圳创维数字技术有限公司 A kind of Bluetooth pairing methods, device, terminal and storage medium
CN110139180A (en) * 2019-04-08 2019-08-16 努比亚技术有限公司 Progress control method, device and computer readable storage medium
CN110047219A (en) * 2019-04-17 2019-07-23 谢财滨 A kind of control system and control method of shared washing machine
CN110062366A (en) * 2019-04-18 2019-07-26 深圳创维数字技术有限公司 Bluetooth pairing abnormality eliminating method, equipment, storage medium and device
CN112181144A (en) * 2020-09-25 2021-01-05 北京博睿维讯科技有限公司 Terminal control method and system

Also Published As

Publication number Publication date
CN112182549A (en) 2021-01-05

Similar Documents

Publication Publication Date Title
CN107180464B (en) Intelligent lock unlocking method and system using same
CN104952128A (en) Intelligent handheld terminal based electronic unlocking system and unlocking method thereof
US20050221799A1 (en) Smart terminal remote lock and format
KR101764650B1 (en) Antitheft System Of Smart Device
CN109756446B (en) Access method and system for vehicle-mounted equipment
JP2000003336A (en) Method and system for user authentication in portable type data communication terminal
US9592793B2 (en) Method and system for preventing telematics remote control vehicle from being externally hacked
KR100748034B1 (en) Apparatus and method for bluetooth control in portable terminal
US10321319B2 (en) Securing access to vehicles
EP1755273B1 (en) Apparatus and method for authenticating a telematics terminal in a vehicle
CN106154997B (en) Vehicle-mounted control device, terminal device, and vehicle control program updating method and system
KR20120074892A (en) Black box for vehicle and access certifiantion method thereof
KR20110111022A (en) Method and apparatus for protecting information in user terminal
KR101765080B1 (en) smart door lock system based on iot and the method thereof
KR101612530B1 (en) Method and apparatus for managing security
CN112182549B (en) Security control master control method, system and storage medium thereof
CN110611913A (en) Wireless network access method, system management platform and access system for nuclear power plant
CN107454557B (en) Router connection method and system
KR100944246B1 (en) Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module
JP4240962B2 (en) Information terminal management system
CN105635090A (en) System access method, system access device and terminal
CN110535644B (en) Intelligent equipment remote control method, system and storage medium
KR20160038478A (en) System For Protecting Bluetooth Decive To be Lost And Stolen
KR101537272B1 (en) System and method of controlling user device for managing information security
CN113163392A (en) Method and device for deleting user identity data file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant