CN112784234A - Supplier management method - Google Patents
Supplier management method Download PDFInfo
- Publication number
- CN112784234A CN112784234A CN202110130380.0A CN202110130380A CN112784234A CN 112784234 A CN112784234 A CN 112784234A CN 202110130380 A CN202110130380 A CN 202110130380A CN 112784234 A CN112784234 A CN 112784234A
- Authority
- CN
- China
- Prior art keywords
- information
- preset
- data
- stored
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a supplier management method, which comprises the following steps: receiving login information; searching a supplier information database according to the account information to obtain stored password information; judging whether the password information is consistent with the stored password information; when the password information is consistent with the stored password information, receiving input information, and decrypting the input information to obtain decryption parameters; judging whether the decryption parameters are consistent with preset parameters or not; when the decryption parameter is consistent with the preset parameter, identifying the type information of the input information; determining authority information according to the account information, and determining support type information according to the authority information; determining information to be stored according to the type information and the support type information; the information to be stored is input information of which the type information is support type information; analyzing and processing the information to be stored to obtain storage position information; and storing the corresponding input information according to the storage position information.
Description
Technical Field
The invention relates to the technical field of information, in particular to a supplier management method.
Background
Suppliers are businesses and individuals who supply a variety of desired resources to businesses and their competitors, including providing raw materials, equipment, energy, labor, etc. How their situation can have a great influence on the marketing activities of the enterprise, such as raw material price changes, shortages, etc., all affect the price and delivery date of the enterprise products and thus impair the long-term cooperation and benefits of the enterprise and the customers, so that a relatively comprehensive understanding and thorough analysis of the supplier's situation is necessary.
The information statistical method of the suppliers at the present stage has low efficiency and large tracking difficulty, and the aim of optimizing management is difficult to achieve.
Disclosure of Invention
The invention aims to provide a supplier management method aiming at the defects of the prior art, which can automatically store the supply information of a supplier and simultaneously track and evaluate the supplier to realize the optimized management of the supplier.
To achieve the above object, the present invention provides a supplier management method, including:
receiving login information; the login information comprises account information and password information;
searching a supplier information database according to the account information to obtain stored password information;
judging whether the password information is consistent with the stored password information;
when the password information is consistent with the stored password information, receiving input information, and decrypting the input information to obtain decryption parameters;
judging whether the decryption parameters are consistent with preset parameters or not;
when the decryption parameter is consistent with the preset parameter, identifying the type information of the input information;
determining authority information according to the account information, and determining support type information according to the authority information;
determining information to be stored according to the type information and the support type information; the information to be stored is input information of which the type information is support type information;
analyzing and processing the information to be stored to obtain storage position information;
and storing the corresponding input information according to the storage position information.
Preferably, the application information is received;
scoring according to the application information to obtain scoring data;
judging whether the grading data reach a preset grading threshold value or not;
when the grading data reach a preset grading threshold value, determining grading interval information according to the grading data, and determining authority information according to the grading interval information and the application information;
generating account information according to the application information and the random code;
and establishing an association relation among the application information, the account information and the authority information.
Further preferably, when the score data does not reach the preset score threshold, substandard information is generated and fed back.
Preferably, the analyzing and processing according to the information to be stored to obtain the storage location information specifically includes:
carrying out keyword extraction processing on the input information, and carrying out comparison processing according to an extraction result and a preset keyword;
when the similarity data of the extraction result and the preset keywords reach a preset similarity threshold, carrying out sequencing processing according to the similarity data, and determining the preset keyword corresponding to the highest similarity data as a first keyword;
and determining storage position information according to the first keyword.
Preferably, when both the extraction result and the similarity data of the preset keyword do not reach the preset similarity threshold, a first number of near-meaning results are determined according to the extraction result, and comparison processing is performed according to the near-meaning results and the preset keyword.
Preferably, when the password information is inconsistent with the stored password information, login failure prompt information is generated and fed back.
Preferably, when the decrypted data is inconsistent with the preset data, the safety prompt message is generated.
Further preferably, the number of the safety prompt messages is counted;
and when the number reaches a preset number threshold value, modifying the permission information according to a preset mechanism.
The supplier management method provided by the embodiment of the invention can be used for automatically storing the supply information of the supplier and simultaneously tracking and evaluating the supplier so as to realize the optimized management of the supplier.
Drawings
Fig. 1 is a flowchart of a supplier management method according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
The supplier management method provided by the invention can automatically store the supply information of the supplier, and simultaneously can track and evaluate the supplier, thereby realizing the optimized management of the supplier.
Fig. 1 is a flowchart of a supplier management method according to an embodiment of the present invention, and the following describes a technical solution of the present invention in detail with reference to fig. 1.
specifically, the login information includes account information and password information.
specifically, account information of the supplier is stored in the supplier information database, and each account information corresponds to one stored password information. The stored password information is the correct password information for the account information. The password information is the password information actually input by the vendor and is not necessarily correct.
specifically, when the password information is consistent with the stored password information, the login is successful, and step 104 is executed; and when the password information is inconsistent with the stored password information, the login fails, and step 120 is executed to generate and feed back login failure prompt information.
In the optimized scheme, the number of login failure prompt messages in a preset time period is counted, and when the number of the login failure prompt messages reaches a preset failure threshold value, the account is judged to have risks, and the account is limited to login.
In a further preferred embodiment, the login information includes a device ID. And judging whether the device ID is the device which is successfully logged in before. If the equipment is not successfully logged in before, the risk of stealing the number is judged to exist, and the ID of the equipment logged in this time is added into a blacklist, so that the safety of the account information of the supplier is guaranteed.
in particular, the input information may be understood as data information uploaded by the supplier or information about the supplied product. In order to ensure data security, the stored data is prevented from being tampered. Each vendor has a set of provisioned public and private keys. And in the process of uploading the input information, encrypting the input information through the public key. And when the supplier management platform receives the input information, the supplier management platform decrypts the input information by using the matched private key.
In a preferred scheme, the public key and the private key which are correspondingly equipped for each account information are time-efficient. And when the time effect is reached, automatically replacing the public key and the private key of each account information. That is, the public key and the private key of each account information are not fixed, but are dynamically changed. The information encryption mode can reduce the probability of decoding the encrypted information, reduce the risk of data tampering and ensure the data security of suppliers.
specifically, when the decryption parameter is consistent with the preset parameter, it indicates that the data is not tampered, and step 106 is executed; and when the decrypted data is inconsistent with the preset data, indicating that the data is tampered and risking, executing step 130 and generating safety prompt information.
In a preferred scheme, the number of the safety prompt messages is counted. And when the number reaches a preset number threshold value, modifying the authority information according to a preset mechanism. That is, when input information uploaded by one provider many times has a problem, the corresponding authority of the provider is restricted or degraded until the seal number is processed.
specifically, the type information may be understood as a format of the input information, for example, a picture format, a text format.
specifically, to optimize the vendor structure, the rights information of different vendors is different. The number of supported type information of the input information of the supplier with low authority is small. The number of supported type information of the input information of the provider having a high authority is large.
specifically, the information to be stored is input information of which the type information is support type information.
specifically, keyword extraction processing is performed on the input information, and comparison processing is performed according to an extraction result and a preset keyword. And when the similarity data of the extraction result and the preset keywords reach a preset similarity threshold value, carrying out sequencing processing according to the similarity data, and determining the preset keyword corresponding to the highest similarity data as a first keyword. And determining the storage position information according to the first keyword. And when the extraction result and the similarity data of the preset keywords do not reach the preset similarity threshold, determining a first number of near-meaning results according to the extraction result, and performing comparison processing according to the near-meaning results and the preset keywords. And when the similarity data of the similarity result and the preset keywords reach a preset similarity threshold, carrying out sequencing processing according to the similarity data, and determining the preset keyword corresponding to the highest similarity data as a first keyword. And determining the storage position information according to the first keyword. And when the similarity result and the similarity data of the preset keywords do not reach the preset similarity threshold value, taking the preset position information as the storage position information.
And step 110, storing the corresponding input information according to the storage position information.
Specifically, the storage location information may include information that a server ID, a database ID, a folder ID, and the like may be used to indicate a location.
In a preferred arrangement, application information is received. And carrying out grading processing according to the application information to obtain grading data. And judging whether the grading data reach a preset grading threshold value. And when the grading data reach a preset grading threshold value, determining grading interval information according to the grading data, and determining authority information according to the grading interval information and the application information. And generating account information according to the application information and the random code. And establishing an association relation among the application information, the account information and the authority information. And when the grading data does not reach the preset grading threshold value, generating substandard information and feeding back the substandard information.
The application information includes the name of the supplier, the registration address, the telephone information, the contact information, the property of the enterprise, the valid certificate of the enterprise, the credit code certificate and other enterprise basic information. The grading processing comprises grading the correctness and the authenticity of the application information, and comprehensively grading the corresponding external evaluation, sales data and the like acquired according to the application information.
The generation of the account information according to the application information and the random code may specifically be that a combined code is generated according to the application time, the region of the provider, the type and other information and according to a set rule, and then the account information is generated according to the combined code and the random code. The account information can quickly read the information of the supplier, and is more convenient compared with the traditional account information which is only generated by random coding or sequential coding.
In another preferred embodiment, order placing information of the user is received, and the order placing information includes account information of the supplier. And counting the sales information and the after-sales evaluation information of the suppliers in a preset counting time period. And tracking and scoring the suppliers according to the sales information and the after-sale evaluation information to obtain stage scoring data. And modifying the authority information of the supplier according to the stage grading data to achieve the aim of dynamically tracking and evaluating the supplier.
The supplier management method of the invention automatically stores the supply information of the supplier, simultaneously tracks and evaluates the supplier, and realizes the optimized management of the supplier.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (8)
1. A supplier management method, characterized in that the supplier management method comprises:
receiving login information; the login information comprises account information and password information;
searching a supplier information database according to the account information to obtain stored password information;
judging whether the password information is consistent with the stored password information;
when the password information is consistent with the stored password information, receiving input information, and decrypting the input information to obtain decryption parameters;
judging whether the decryption parameters are consistent with preset parameters or not;
when the decryption parameter is consistent with the preset parameter, identifying the type information of the input information;
determining authority information according to the account information, and determining support type information according to the authority information;
determining information to be stored according to the type information and the support type information; the information to be stored is input information of which the type information is support type information;
analyzing and processing the information to be stored to obtain storage position information;
and storing the corresponding input information according to the storage position information.
2. The supplier management method according to claim 1, further comprising:
receiving application information;
scoring according to the application information to obtain scoring data;
judging whether the grading data reach a preset grading threshold value or not;
when the grading data reach a preset grading threshold value, determining grading interval information according to the grading data, and determining authority information according to the grading interval information and the application information;
generating account information according to the application information and the random code;
and establishing an association relation among the application information, the account information and the authority information.
3. The supplier management method according to claim 2, further comprising:
and when the grading data does not reach the preset grading threshold value, generating substandard information and feeding back the substandard information.
4. The supplier management method according to claim 1, wherein the analyzing according to the information to be stored to obtain the storage location information specifically comprises:
carrying out keyword extraction processing on the input information, and carrying out comparison processing according to an extraction result and a preset keyword;
when the similarity data of the extraction result and the preset keywords reach a preset similarity threshold, carrying out sequencing processing according to the similarity data, and determining the preset keyword corresponding to the highest similarity data as a first keyword;
and determining storage position information according to the first keyword.
5. The supplier management method according to claim 4, further comprising:
and when the extraction result and the similarity data of the preset keywords do not reach a preset similarity threshold, determining a first number of near-meaning results according to the extraction result, and performing comparison processing according to the near-meaning results and the preset keywords.
6. The supplier management method according to claim 1, further comprising:
and when the password information is inconsistent with the stored password information, generating login failure prompt information and feeding back the login failure prompt information.
7. The supplier management method according to claim 1, further comprising:
and when the decrypted data is inconsistent with the preset data, generating safety prompt information.
8. The supplier management method according to claim 7, further comprising:
counting the number of the safety prompt messages;
and when the number reaches a preset number threshold value, modifying the permission information according to a preset mechanism.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110130380.0A CN112784234B (en) | 2021-01-29 | 2021-01-29 | Supplier management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110130380.0A CN112784234B (en) | 2021-01-29 | 2021-01-29 | Supplier management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112784234A true CN112784234A (en) | 2021-05-11 |
CN112784234B CN112784234B (en) | 2023-08-04 |
Family
ID=75759997
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110130380.0A Active CN112784234B (en) | 2021-01-29 | 2021-01-29 | Supplier management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112784234B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004013213A (en) * | 2002-06-03 | 2004-01-15 | Mediaselect Inc | Logical directory constituting method, logical tree display method, logical tree display condition setting method, and information processor |
CN1691025A (en) * | 2004-04-29 | 2005-11-02 | 鸿富锦精密工业(深圳)有限公司 | Management system and method for scrutiny of supplier achievement |
US20060143074A1 (en) * | 2004-12-27 | 2006-06-29 | Tien-Chieh Wu | Vender evaluation method |
US20070208684A1 (en) * | 2006-03-06 | 2007-09-06 | Fuji Xerox Co., Ltd. | Information collection support apparatus, method of information collection support, computer readable medium, and computer data signal |
CN101882281A (en) * | 2009-05-05 | 2010-11-10 | 张海潮 | Method and system for reserving supplier for event |
CN103023875A (en) * | 2012-11-21 | 2013-04-03 | 北京荣之联科技股份有限公司 | Account management system and method |
CN103678437A (en) * | 2012-08-31 | 2014-03-26 | 株式会社日立制作所 | Supplier retrieval apparatus and supplier retrieval method |
CN106327223A (en) * | 2016-11-07 | 2017-01-11 | 上海耿沛网络科技有限公司 | System for realizing supplier's management of goods |
KR20170089163A (en) * | 2016-01-26 | 2017-08-03 | 서강대학교산학협력단 | The method of Semantic information indexing for spatio-temporal database searching system |
CN107423314A (en) * | 2017-03-22 | 2017-12-01 | 深圳市瑞荣创电子科技有限公司 | A kind of network group buying information system and its device and information providing method |
CN109150903A (en) * | 2018-09-25 | 2019-01-04 | 平安科技(深圳)有限公司 | A kind of account management method, device, storage medium and terminal device |
CN109242562A (en) * | 2018-08-31 | 2019-01-18 | 万翼科技有限公司 | Ranking method, device and the storage medium of supplier |
CN110084064A (en) * | 2019-04-24 | 2019-08-02 | 广州知弘科技有限公司 | Big data analysis processing method and system based on terminal |
CN111788597A (en) * | 2018-06-05 | 2020-10-16 | 株式会社日立制作所 | Transaction management system and transaction management method |
CN112187736A (en) * | 2020-09-10 | 2021-01-05 | 珠海格力电器股份有限公司 | Supply chain account login method and device based on mobile terminal |
-
2021
- 2021-01-29 CN CN202110130380.0A patent/CN112784234B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004013213A (en) * | 2002-06-03 | 2004-01-15 | Mediaselect Inc | Logical directory constituting method, logical tree display method, logical tree display condition setting method, and information processor |
CN1691025A (en) * | 2004-04-29 | 2005-11-02 | 鸿富锦精密工业(深圳)有限公司 | Management system and method for scrutiny of supplier achievement |
US20060143074A1 (en) * | 2004-12-27 | 2006-06-29 | Tien-Chieh Wu | Vender evaluation method |
US20070208684A1 (en) * | 2006-03-06 | 2007-09-06 | Fuji Xerox Co., Ltd. | Information collection support apparatus, method of information collection support, computer readable medium, and computer data signal |
CN101882281A (en) * | 2009-05-05 | 2010-11-10 | 张海潮 | Method and system for reserving supplier for event |
CN103678437A (en) * | 2012-08-31 | 2014-03-26 | 株式会社日立制作所 | Supplier retrieval apparatus and supplier retrieval method |
CN103023875A (en) * | 2012-11-21 | 2013-04-03 | 北京荣之联科技股份有限公司 | Account management system and method |
KR20170089163A (en) * | 2016-01-26 | 2017-08-03 | 서강대학교산학협력단 | The method of Semantic information indexing for spatio-temporal database searching system |
CN106327223A (en) * | 2016-11-07 | 2017-01-11 | 上海耿沛网络科技有限公司 | System for realizing supplier's management of goods |
CN107423314A (en) * | 2017-03-22 | 2017-12-01 | 深圳市瑞荣创电子科技有限公司 | A kind of network group buying information system and its device and information providing method |
CN111788597A (en) * | 2018-06-05 | 2020-10-16 | 株式会社日立制作所 | Transaction management system and transaction management method |
CN109242562A (en) * | 2018-08-31 | 2019-01-18 | 万翼科技有限公司 | Ranking method, device and the storage medium of supplier |
CN109150903A (en) * | 2018-09-25 | 2019-01-04 | 平安科技(深圳)有限公司 | A kind of account management method, device, storage medium and terminal device |
CN110084064A (en) * | 2019-04-24 | 2019-08-02 | 广州知弘科技有限公司 | Big data analysis processing method and system based on terminal |
CN112187736A (en) * | 2020-09-10 | 2021-01-05 | 珠海格力电器股份有限公司 | Supply chain account login method and device based on mobile terminal |
Non-Patent Citations (3)
Title |
---|
李宇溪;周福才;徐剑;徐紫枫;: "双服务器模型下支持相关度排序的多关键字密文搜索方案", 计算机研究与发展, no. 10, pages 2149 - 2163 * |
王向楠: "基于网络互联的电子制造企业供应商管理系统", 中国优秀硕士学位论文全文数据库信息科技辑, no. 3, pages 138 - 1303 * |
黄冠尧;薛开平;洪佩琳;熊继平;: "SSCAN:一种安全的基于CAN的语义网络", 电路与系统学报, no. 02, pages 50 - 56 * |
Also Published As
Publication number | Publication date |
---|---|
CN112784234B (en) | 2023-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11743041B2 (en) | Technologies for private key recovery in distributed ledger systems | |
US10614244B1 (en) | Sensitive data aliasing | |
CN111080295B (en) | Electronic contract processing method and device based on blockchain | |
US10904014B2 (en) | Encryption synchronization method | |
US9582801B2 (en) | Secure communication of payment information to merchants using a verification token | |
US20080301464A1 (en) | Two-dimensional bar code for ID card | |
CN110602248A (en) | Abnormal behavior information identification method, system, device, equipment and medium | |
US8875280B2 (en) | Protecting an electronic device against unathorized hardware use | |
US20150149775A1 (en) | Method and System of Secure Email | |
AU2010292125A1 (en) | Secure communication of payment information to merchants using a verification token | |
US9432328B2 (en) | Method for the certification of electronic mail delivery | |
CN113140079A (en) | Intelligent cabinet opening method, data processing method and device and intelligent cabinet application system | |
US20060294395A1 (en) | Executable software security system | |
CN112785240A (en) | Method and device for processing e-mail, computer readable medium and electronic equipment | |
CN108900472B (en) | Information transmission method and device | |
Amft et al. | " We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments | |
CN113836522A (en) | Password management method and device of monitoring equipment | |
CN108234126B (en) | System and method for remote account opening | |
CN105515959A (en) | Implementation method of CMS technology-based instant messenger security system | |
CN112784234B (en) | Supplier management method | |
Al-Sarayreh et al. | A trade-off model of software requirements for balancing between security and usability issues | |
US11496316B1 (en) | System and method for identity verification for online dating | |
US10853898B1 (en) | Method and apparatus for controlled messages | |
CN111582954B (en) | False data identification method and device | |
CN114401117A (en) | Account login verification system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |