CN113905378A - Information synchronization method and device based on wireless network security and cloud server - Google Patents

Information synchronization method and device based on wireless network security and cloud server Download PDF

Info

Publication number
CN113905378A
CN113905378A CN202011613233.0A CN202011613233A CN113905378A CN 113905378 A CN113905378 A CN 113905378A CN 202011613233 A CN202011613233 A CN 202011613233A CN 113905378 A CN113905378 A CN 113905378A
Authority
CN
China
Prior art keywords
terminal equipment
authentication
data information
information
synchronization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011613233.0A
Other languages
Chinese (zh)
Inventor
屈建芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Zhiyun Chuangyu Information Technology Co ltd
Original Assignee
Suzhou Zhiyun Chuangyu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Zhiyun Chuangyu Information Technology Co ltd filed Critical Suzhou Zhiyun Chuangyu Information Technology Co ltd
Priority to CN202011613233.0A priority Critical patent/CN113905378A/en
Publication of CN113905378A publication Critical patent/CN113905378A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides an information synchronization method, an information synchronization device and a cloud server based on wireless network security, wherein the method comprises the following steps: monitoring whether data information of a target account number is changed or not under the condition that the target account number logs in a plurality of wireless terminal devices; if the target account is monitored to have data information change at the target moment, acquiring the identity verification information of the terminal equipment which needs to perform data information change synchronization in the plurality of wireless terminal equipment; according to the identity authentication information, determining the terminal equipment of which the identity authentication mode is a non-secure identity authentication mode as first terminal equipment; and not performing the data information change synchronization for the first terminal equipment. By adopting the method and the system, the content can be displayed asynchronously at different login terminals when data change is carried out, the data security is effectively ensured, and the network security experience of a user is improved.

Description

Information synchronization method and device based on wireless network security and cloud server
Technical Field
The invention relates to the technical field of network security, in particular to an information synchronization method and device based on wireless network security and a cloud server.
Background
With the development of internet technology and the increasing of people's living standard, various network-based applications begin to affect people's lives. Sometimes, in order to facilitate data movement, a user often needs to log in an application program at different terminals, such as application programs of QQ, wechat, and the like, to support simultaneous login at a mobile terminal (such as a mobile phone, a pad, and the like) and a computer, and data can be transmitted between different login terminals.
However, in some cases, the user may not want all data to be synchronized on all terminals, for example, sometimes the user does not want to synchronize data to the internet cafe computer when the internet cafe computer logs in the application; for example, when a user logs in an application program at a computer end and a mobile phone end at the same time, but the user himself operates the mobile phone end and is not near the computer end, if data is synchronized blindly, the risk that the data is stolen by a third party may exist, and certain threat is caused to the user data.
Disclosure of Invention
In order to overcome at least the above disadvantages in the prior art, the present invention provides an information synchronization method and apparatus based on wireless network security, and a cloud server.
In a first aspect, the present invention provides an information synchronization method based on wireless network security, including:
monitoring whether a target account has data information change or not under the condition that the target account logs in a plurality of wireless terminal devices;
if the target account is monitored to have data information change at the target moment, acquiring authentication information of terminal equipment needing data information change synchronization in the plurality of wireless terminal equipment, wherein the authentication information comprises a last authentication mode of the terminal equipment;
according to the identity authentication information, determining the terminal equipment of which the identity authentication mode is a non-secure identity authentication mode as first terminal equipment, wherein the non-secure identity authentication mode comprises digital password identity authentication or graphic identity authentication; according to the identity authentication information, the terminal equipment of which the identity authentication mode is a safe identity authentication mode is judged as second terminal equipment;
and not carrying out the data information change synchronization on the first terminal equipment, and prompting that the data information change and the equipment identification of the second terminal equipment exist on the first terminal equipment.
Not performing the data information change synchronization for the first terminal device includes: and according to the data information change content screening display, the information to be synchronized with high authority level is not synchronized to the first terminal, and the information to be synchronized with low authority level is synchronized to the first terminal equipment.
In a second aspect, the present invention provides an information synchronization apparatus based on wireless network security, including:
the monitoring module is used for monitoring whether the target account has data information change or not under the condition that the target account logs in a plurality of wireless terminal devices;
the monitoring module is used for acquiring authentication information of terminal equipment which needs to perform data information change synchronization in the plurality of wireless terminal equipment if the target account number is monitored to have data information change at a target moment, wherein the authentication information comprises a last authentication mode of the terminal equipment;
the first judging module is used for judging the terminal equipment with the authentication mode being a non-secure authentication mode as the first terminal equipment according to the authentication information, wherein the non-secure authentication mode comprises digital password authentication or graphic authentication;
the second judgment module is used for judging the terminal equipment with the identity authentication mode as a safe identity authentication mode as second terminal equipment according to the identity authentication information;
the first control module is configured to not perform the data information change synchronization for the first terminal device, and to prompt that there is a data information change and a device identifier of the second terminal device on the first terminal device, and not perform the data information change synchronization for the first terminal device includes: and according to the data information change content screening display, the information to be synchronized with high authority level is not synchronized to the first terminal, and the information to be synchronized with low authority level is synchronized to the first terminal equipment.
In a third aspect, an embodiment of the present invention further provides a cloud server, where the cloud server includes a processor, a machine-readable storage medium, and a network interface, where the machine-readable storage medium, the network interface, and the processor are connected through a bus system, the network interface is used for being communicatively connected with at least one user terminal, the machine-readable storage medium is used for storing a program, an instruction, or a code, and the processor is used for executing the program, the instruction, or the code in the machine-readable storage medium to perform the method for synchronizing information based on wireless network security in any one of the first aspect or the possible design of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where instructions are stored, and when executed, cause a computer to perform the method for information synchronization based on wireless network security in the first aspect or any one of the possible designs of the first aspect.
Based on any one of the above aspects, in the embodiment of the present invention, in a case where a target account logs in to multiple wireless terminal devices, whether data information of the target account is changed is monitored; if the target account is monitored to have data information change at the target moment, acquiring the identity verification information of the terminal equipment which needs to perform data information change synchronization in the plurality of wireless terminal equipment; and according to the identity authentication information, judging the terminal equipment with the identity authentication mode being a non-secure identity authentication mode as the first terminal equipment, and not carrying out the data information change synchronization on the first terminal equipment. By adopting the method and the system, the content can be displayed asynchronously at different login terminals when data change is carried out, so that whether the data information change is synchronized to the terminal equipment or not is determined, the data safety of a user is protected conveniently, meanwhile, a wireless network communication link is saved in an asynchronous data mode, the data safety is effectively ensured, and the network safety experience of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic view of an application scenario of an information synchronization system based on wireless network security according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an information synchronization method based on wireless network security according to an embodiment of the present invention;
fig. 3 is a functional block diagram of an information synchronization apparatus based on wireless network security according to an embodiment of the present invention;
fig. 4 is a schematic block diagram of a structure of a cloud server for implementing the information synchronization method based on wireless network security according to an embodiment of the present invention.
Detailed Description
The present invention is described in detail below with reference to the drawings, and the specific operation methods in the method embodiments can also be applied to the apparatus embodiments or the system embodiments.
Fig. 1 is an interaction diagram of an information synchronization system 10 based on wireless network security according to an embodiment of the present invention. The information synchronization system 10 based on wireless network security may include a cloud server 100 and a user terminal 200 communicatively connected to the cloud server 100. The wireless network security based information synchronization system 10 shown in fig. 1 is only one possible example, and in other possible embodiments, the wireless network security based information synchronization system 10 may also include only a portion of the components shown in fig. 1 or may also include other components.
In this embodiment, the user terminal 200 may comprise a mobile device, a tablet computer, a laptop computer, etc., or any combination thereof. In some embodiments, the mobile device may include a smart home device, a wearable device, a smart mobile device, a virtual reality device, an augmented reality device, or the like, or any combination thereof. In some embodiments, the smart home devices may include control devices of smart electrical devices, smart monitoring devices, smart televisions, smart cameras, and the like, or any combination thereof. In some embodiments, the wearable device may include a smart bracelet, a smart lace, smart glass, a smart helmet, a smart watch, a smart garment, a smart backpack, a smart accessory, or the like, or any combination thereof. In some embodiments, the smart mobile device may include a smartphone, a personal digital assistant, a gaming device, and the like, or any combination thereof. In some embodiments, the virtual reality device and/or the augmented reality device may include a virtual reality helmet, virtual reality glass, a virtual reality patch, an augmented reality helmet, augmented reality glass, an augmented reality patch, or the like, or any combination thereof. For example, the virtual reality device and/or augmented reality device may include various virtual reality products and the like.
In this embodiment, the cloud server 100 and the user terminal 200 in the information synchronization system 10 based on wireless network security may cooperatively perform the information synchronization method based on wireless network security described in the following method embodiment, and the detailed description of the following method embodiment may be referred to for the execution steps of the cloud server 100 and the user terminal 200.
To solve the technical problem in the foregoing background art, fig. 2 is a schematic flowchart of an information synchronization method based on wireless network security according to an embodiment of the present invention, where the information synchronization method based on wireless network security according to the present embodiment may be executed by the cloud server 100 shown in fig. 1, and the information synchronization method based on wireless network security is described in detail below.
Step S110, monitoring whether a target account has data information change or not under the condition that the target account logs in a plurality of wireless terminal devices;
step S120, if it is monitored that the target account number has data information change at the target moment, acquiring authentication information of terminal equipment needing data information change synchronization in the plurality of wireless terminal equipment, wherein the authentication information comprises a last authentication mode of the terminal equipment;
step S130, according to the identity authentication information, determining the terminal equipment with the identity authentication mode being a non-secure identity authentication mode as the first terminal equipment, wherein the non-secure identity authentication mode comprises digital password identity authentication or graphic identity authentication; according to the identity authentication information, the terminal equipment of which the identity authentication mode is a safe identity authentication mode is judged as second terminal equipment;
step S140, the data information change synchronization is not performed for the first terminal device, and the presence of the data information change and the device identifier of the second terminal device is prompted on the first terminal device.
In one possible embodiment, step S140 includes:
step S141, the data information is changed to perform content screening display, the information to be synchronized with the higher authority level is not synchronized with the first terminal, and the information to be synchronized with the lower authority level is synchronized with the first terminal device.
In one possible embodiment, step S120 includes:
step S121, sending an authentication information acquisition instruction to a terminal device which needs to perform data information change synchronization in the plurality of wireless terminal devices;
and step S122, receiving a last terminal device identity verification mode fed back by the terminal device that needs to perform data information change synchronization among the plurality of wireless terminal devices.
In one possible embodiment, the secure authentication means includes at least one of the following authentication means: fingerprint authentication, iris authentication, face recognition authentication, voiceprint authentication and password authentication; and controlling to change and synchronize the data information to the second terminal equipment.
In a possible embodiment, a prompt message is sent to the first terminal device, where the prompt message is used to prompt that there is change information that has not been obtained in the data information change.
Fig. 3 is a schematic functional module diagram of an information synchronization apparatus 300 based on wireless network security according to an embodiment of the present invention, and in this embodiment, functional modules of the information synchronization apparatus 300 based on wireless network security may be divided according to a method embodiment executed by the cloud server 100, that is, the following functional modules corresponding to the information synchronization apparatus 300 based on wireless network security may be used to execute each method embodiment executed by the cloud server 100. The information synchronization apparatus 300 based on wireless network security may include a monitoring module 310, an obtaining module 320, a first determining module 330, a second determining module 340, and a first control module 350, and the functions of the functional modules of the information synchronization apparatus 300 based on wireless network security are described in detail below.
The monitoring module 310 may be configured to perform step S110 described above, that is, to monitor whether a target account has data information changed when the target account is logged in a plurality of wireless terminal devices.
The obtaining module 320 may be configured to execute the step S120, that is, if it is monitored that the target account number has data information change at the target time, obtain authentication information of a terminal device that needs to perform data information change synchronization in the plurality of wireless terminal devices, where the authentication information includes a last authentication manner of the terminal device.
The first determining module 330 may be configured to execute the step S130, that is, configured to determine, according to the authentication information, a terminal device whose authentication manner is a non-secure authentication manner as the first terminal device, where the non-secure authentication manner includes digital password authentication or graphical authentication.
The second determining module 340 may be configured to execute the step S140, that is, configured to determine, according to the identity verification information, the terminal device whose identity verification mode is a secure identity verification mode as the second terminal device.
The first control module 350 may be configured to perform not performing the data information change synchronization for the first terminal device, and to prompt on the first terminal that there is a data information change and a device identification of the second terminal device, and not performing the data information change synchronization for the first terminal device includes: and according to the data information change content screening display, the information to be synchronized with high authority level is not synchronized to the first terminal, and the information to be synchronized with low authority level is synchronized to the first terminal equipment.
It should be noted that the division of the modules of the above apparatus is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the monitoring module 310 may be a separate processing element, or may be integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and a processing element of the apparatus calls and executes the functions of the monitoring module 310. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), etc. For another example, when some of the above modules are implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can call the program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
Fig. 4 is a schematic diagram illustrating a hardware structure of the cloud server 100 for implementing the control device, according to an embodiment of the present invention, as shown in fig. 4, the cloud server 100 may include a processor 110, a machine-readable storage medium 120, a bus 130, and a transceiver 140.
In a specific implementation process, at least one processor 110 executes computer-executable instructions stored in the machine-readable storage medium 120 (for example, included in the wireless network security-based information synchronization apparatus 300 shown in fig. 3), so that the processor 110 may perform the wireless network security-based information synchronization method according to the above method embodiment, where the processor 110, the machine-readable storage medium 120, and the transceiver 140 are connected through the bus 130, and the processor 110 may be configured to control the transceiving action of the transceiver 140, so as to perform data transceiving with the user terminal 200.
For a specific implementation process of the processor 110, reference may be made to the above-mentioned method embodiments executed by the cloud server 100, and implementation principles and technical effects are similar, which are not described herein again.
In the embodiment shown in fig. 4, it should be understood that the processor may be a Central Processing Unit (CPU), other general-purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The machine-readable storage medium 120 may comprise high-speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus 130 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus 130 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
In addition, the embodiment of the present invention further provides a readable storage medium, where the readable storage medium stores computer execution instructions, and when a processor executes the computer execution instructions, the information synchronization method based on wireless network security is implemented as above.
The readable storage medium described above may be implemented by any type of volatile or non-volatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. Readable storage media can be any available media that can be accessed by a general purpose or special purpose computer.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An information synchronization method based on wireless network security is characterized by comprising the following steps:
monitoring whether a target account has data information change or not under the condition that the target account logs in a plurality of wireless terminal devices;
if the target account is monitored to have data information change at the target moment, acquiring authentication information of terminal equipment needing data information change synchronization in the plurality of wireless terminal equipment, wherein the authentication information comprises a last authentication mode of the terminal equipment;
according to the identity authentication information, determining the terminal equipment of which the identity authentication mode is a non-secure identity authentication mode as first terminal equipment, wherein the non-secure identity authentication mode comprises digital password identity authentication or graphic identity authentication; according to the identity authentication information, the terminal equipment of which the identity authentication mode is a safe identity authentication mode is judged as second terminal equipment;
the data information change synchronization is not carried out on the first terminal equipment, and the existence of the data information change and the equipment identification of the second terminal equipment is prompted on the first terminal equipment;
not performing the data information change synchronization for the first terminal device includes: and according to the data information change content screening display, the information to be synchronized with high authority level is not synchronized to the first terminal, and the information to be synchronized with low authority level is synchronized to the first terminal equipment.
2. The method of claim 1, wherein the obtaining of the authentication information of the terminal device requiring data information change synchronization from among the plurality of wireless terminal devices comprises:
sending an identity authentication information acquisition instruction to a terminal device which needs to perform data information change synchronization in the plurality of wireless terminal devices;
and receiving the last terminal equipment identity verification mode fed back by the terminal equipment needing data information change synchronization in the plurality of wireless terminal equipment.
3. The method of claim 1, wherein the method further comprises:
the secure identity authentication mode comprises at least one of the following authentication modes: fingerprint authentication, iris authentication, face recognition authentication, voiceprint authentication and password authentication;
and controlling to change and synchronize the data information to the second terminal equipment.
4. The method of claim 3, wherein the method further comprises:
and sending prompt information to the first terminal equipment, wherein the prompt information is used for prompting that change information which is not acquired exists in the data information change.
5. An information synchronization apparatus based on wireless network security, comprising:
the monitoring module is used for monitoring whether the target account has data information change or not under the condition that the target account logs in a plurality of wireless terminal devices;
the monitoring module is used for acquiring authentication information of terminal equipment which needs to perform data information change synchronization in the plurality of wireless terminal equipment if the target account number is monitored to have data information change at a target moment, wherein the authentication information comprises a last authentication mode of the terminal equipment;
the first judging module is used for judging the terminal equipment with the authentication mode being a non-secure authentication mode as the first terminal equipment according to the authentication information, wherein the non-secure authentication mode comprises digital password authentication or graphic authentication;
the second judgment module is used for judging the terminal equipment with the identity authentication mode as a safe identity authentication mode as second terminal equipment according to the identity authentication information;
the first control module is configured to not perform the data information change synchronization for the first terminal device, and to prompt that there is a data information change and a device identifier of the second terminal device on the first terminal device, and not perform the data information change synchronization for the first terminal device includes: and according to the data information change content screening display, the information to be synchronized with high authority level is not synchronized to the first terminal, and the information to be synchronized with low authority level is synchronized to the first terminal equipment.
6. The apparatus of claim 5, wherein the monitoring module comprises:
the acquisition unit is used for sending an identity verification information acquisition instruction to terminal equipment which needs to carry out data information change synchronization in the plurality of wireless terminal equipment if the target account is monitored to have data information change at a target moment;
and the receiving unit is used for receiving the last terminal equipment identity authentication mode fed back by the terminal equipment which needs to perform data information change synchronization in the plurality of wireless terminal equipment.
7. The apparatus of claim 5, wherein the apparatus further comprises:
the secure identity authentication mode comprises at least one of the following authentication modes: fingerprint authentication, iris authentication, face recognition authentication, voiceprint authentication and password authentication;
and the second control module is used for controlling the data information to be changed and synchronized to the second terminal equipment.
8. The apparatus of claim 7, wherein the apparatus further comprises:
and the prompting module is used for sending prompting information to the first terminal equipment, wherein the prompting information is used for prompting that the change information which is not obtained exists in the data information change.
9. A computer readable storage medium storing instructions/executable code which, when executed by a processor of an electronic device, causes the electronic device to implement the method of any of claims 1-4.
10. A cloud server, characterized in that the cloud server comprises a processor, a machine-readable storage medium, and a network interface, the machine-readable storage medium, the network interface, and the processor are connected through a bus system, the network interface is used for being connected with at least one user terminal in a communication manner, the machine-readable storage medium is used for storing programs, instructions, or codes, and the processor is used for executing the programs, instructions, or codes in the machine-readable storage medium to execute the wireless network security-based information synchronization method according to any one of claims 1 to 9.
CN202011613233.0A 2020-12-31 2020-12-31 Information synchronization method and device based on wireless network security and cloud server Withdrawn CN113905378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011613233.0A CN113905378A (en) 2020-12-31 2020-12-31 Information synchronization method and device based on wireless network security and cloud server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011613233.0A CN113905378A (en) 2020-12-31 2020-12-31 Information synchronization method and device based on wireless network security and cloud server

Publications (1)

Publication Number Publication Date
CN113905378A true CN113905378A (en) 2022-01-07

Family

ID=79186911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011613233.0A Withdrawn CN113905378A (en) 2020-12-31 2020-12-31 Information synchronization method and device based on wireless network security and cloud server

Country Status (1)

Country Link
CN (1) CN113905378A (en)

Similar Documents

Publication Publication Date Title
WO2016029595A1 (en) Method, device, and equipment for calling open platform and non-volatile computer storage medium
CN112448956B (en) Authority processing method and device of short message verification code and computer equipment
CN106162505B (en) Soft SIM communication method, device and terminal
CN107819768B (en) Method for server to actively disconnect illegal long connection, terminal equipment and storage medium
CN109688109B (en) Verification method and device of verification code based on client information identification
CN104937602B (en) Privacy protection method and electronic equipment
CN113905378A (en) Information synchronization method and device based on wireless network security and cloud server
US20210306330A1 (en) Authentication server, and non-transitory storage medium
CN113935008B (en) User authentication method, device, electronic equipment and computer readable storage medium
CN106446719B (en) Method for preventing eSIM file from being tampered and mobile terminal
CN108574658B (en) Application login method and device
US10430571B2 (en) Trusted UI authenticated by biometric sensor
CN113747109A (en) Video conference permission level determination method and system and video conference server
CN111107089B (en) Method and device for protecting data transmission safety of Android system
US10846395B2 (en) Detecting suspicious application overlays on a device
CN107872381B (en) Prompting method and device
CN109872148B (en) Trusted data processing method and device based on TUI and mobile terminal
CN112560104A (en) Data storage method and safety information platform based on cloud computing and block chain
CN111932759B (en) Smart park Internet of things data processing platform and method
CN113286116B (en) Information prompting method and device for monitoring security management and cloud server
CN113286170A (en) Video content analysis method and device and cloud server
CN111508617B (en) Epidemic situation data maintenance method and device, computer equipment and readable storage medium
CN113285912A (en) Security management method and device for monitoring content and cloud server
CN114095543A (en) Remote screen control method and device and cloud server
CN113220938A (en) Video monitoring presentation method and device and cloud server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20220107