KR20180007629A - File Searching Method using Identification Number - Google Patents

File Searching Method using Identification Number Download PDF

Info

Publication number
KR20180007629A
KR20180007629A KR1020160088913A KR20160088913A KR20180007629A KR 20180007629 A KR20180007629 A KR 20180007629A KR 1020160088913 A KR1020160088913 A KR 1020160088913A KR 20160088913 A KR20160088913 A KR 20160088913A KR 20180007629 A KR20180007629 A KR 20180007629A
Authority
KR
South Korea
Prior art keywords
identification number
file
terminal
server
user
Prior art date
Application number
KR1020160088913A
Other languages
Korean (ko)
Inventor
배병수
Original Assignee
헬로우링크 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 헬로우링크 주식회사 filed Critical 헬로우링크 주식회사
Priority to KR1020160088913A priority Critical patent/KR20180007629A/en
Priority to PCT/KR2016/007653 priority patent/WO2018012649A1/en
Publication of KR20180007629A publication Critical patent/KR20180007629A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to a file search method using an identification number.
A method for searching a file using an identification number according to the present invention includes the steps of: assigning a personal identification number of a user; assigning a file identification number to a file corresponding to the user; A step of inputting a search expression including the personal identification number, a special symbol, and the file identification number in a first terminal, an input step of inputting a file corresponding to the search expression among the files stored in the server, And transmitting the detected file to the first terminal by the server.

Description

[0001] The present invention relates to a file searching method using an identification number,

The present invention relates to a file search method using an identification number.

Recently, mobile communication technology has provided a simple voice call function. Recently, however, various service functions including a short message service have been added to the mobile communication technology, , The use of wireless Internet using smart terminals such as a smart phone, a smart pad, and a smart TV has become popular, and various application programs based on such wireless Internet and wireless communication technology ) Have been developed and used.

Accordingly, technologies for enabling the use of the wireless Internet or application programs as fast as possible using a mobile communication terminal such as a smart terminal have been developed.

Conventionally, when a file stored in a cloud folder is to be downloaded to a mobile communication terminal, an address of a page providing a cloud service has to be input to access the corresponding page, and a desired file must be directly searched on the accessed page.

According to this conventional technology, there is a problem that it takes a relatively long time to download a desired file, and the retrieval method is complicated.

An object of the present invention is to provide a method of searching for a desired file using an identification number and a special symbol, and a method of searching for a file using an identification number that can be downloaded.

A method for searching a file using an identification number according to the present invention includes the steps of: assigning a personal identification number of a user; assigning a file identification number to a file corresponding to the user; A step of inputting a search expression including the personal identification number, a special symbol, and the file identification number in a first terminal, an input step of inputting a file corresponding to the search expression among the files stored in the server, And transmitting the detected file to the first terminal by the server.

In the searching formula, the special symbol may be located between the personal identification number and the file identification number.

In addition, the special symbols may include at least one of a shop (#) and a star.

The input step may include inputting the search expression into a dial input window of the first terminal, and selecting a call key in a state where the search expression is input to the dial input window.

In addition, the personal identification number may include at least one of a resident registration number, a telephone number, and a social security number.

The method may further include setting security by assigning authentication information to a file corresponding to the user.

The method may further include inputting the authentication information to access the secured file in the first terminal.

The file searching method using the identification number according to the present invention can search for and download a desired file with only a combination of the identification number and the special symbol so that the search is easy and the time required for the search can be reduced.

1 and 2 are views for explaining a search system to which a file search method using an identification number according to the present invention is applied.
3 to 11 are diagrams for explaining a file search method using an identification number according to the present invention.
12 to 16 are diagrams for explaining a file searching method using a folder identification number.
17 to 20 are diagrams for explaining a method of using authentication information.

Hereinafter, a file search method using an identification number according to the present invention will be described in detail with reference to the accompanying drawings.

While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It is to be understood that the present invention is not intended to be limited to the specific embodiments but includes all changes, equivalents, and alternatives falling within the spirit and scope of the present invention.

In describing the present invention, the terms first, second, etc. may be used to describe various components, but the components may not be limited by the terms. The terms may only be used for the purpose of distinguishing one element from another. For example, without departing from the scope of the present invention, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.

The term " and / or " may include any combination of a plurality of related listed items or any of a plurality of related listed items.

When an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, but other elements may be present in between Can be understood. On the other hand, when it is mentioned that an element is "directly connected" or "directly connected" to another element, it can be understood that no other element exists in between.

The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions may include plural expressions unless the context clearly dictates otherwise.

In the present application, the terms "comprises", "having", and the like are used interchangeably to designate one or more of the features, numbers, steps, operations, elements, components, But do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, parts, or combinations thereof.

Unless otherwise defined, all terms used herein, including technical or scientific terms, may have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries can be interpreted as having a meaning consistent with the meaning in the context of the relevant art and are, unless expressly defined in the present application, interpreted in an ideal or overly formal sense .

In addition, the following embodiments are provided to explain more fully to the average person skilled in the art. The shapes and sizes of the elements in the drawings and the like can be exaggerated for clarity.

The various embodiments described below may be implemented in a recording medium readable by a computer or similar device using software, hardware, or a combination thereof.

In accordance with a hardware implementation, embodiments of the present invention may be implemented in a processor, such as application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays may be implemented using at least one of processors, controllers, micro-controllers, microprocessors, and electrical units for performing functions.

On the other hand, according to a software implementation, embodiments such as procedures or functions in the present invention may be implemented with separate software modules that perform at least one function or operation.

Hereinafter, 'A and / or B' can be interpreted as 'at least one of A and B.'

1 and 2 are views for explaining a search system to which a file search method using an identification number according to the present invention is applied.

Referring to FIG. 1, a search system 10 according to the present invention may include a server 100, a first terminal 200, and a second terminal 300. In some cases, either the first terminal 200 or the second terminal 300 in the search system 10 may be omitted.

The server 100 can store various information such as information about the user, various files, information about the identification number, and authentication information. In addition, the server 100 may support a cloud computing method.

The first terminal 200 and the second terminal 300 may access the server 100 and utilize the cloud computing.

The file stored in the server 100 by the first terminal 200 can be downloaded by the second terminal 300 through a predetermined process.

In contrast, the first terminal 200 can download files stored in the server 100 by the second terminal 300 through a predetermined process.

Of course, it is possible for the first terminal 200 and / or the second terminal 300 to download the file stored in the server 100 itself.

Hereinafter, for convenience of explanation, the first terminal 200 stores a predetermined file in the server 100, and the second terminal 300 downloads a file stored in the server 100 using the cloud computing method The case will be described as an example.

That is, the first terminal 200 may be an upload terminal that uploads a predetermined file to the server 100, and the second terminal 300 may be a download terminal that downloads a file stored in the server 100 .

A user of the first terminal 200 can upload a predetermined file to the server 100 using the first terminal 200.

The user of the second terminal 300 can access the server 100 using the second terminal 200 and download predetermined files stored in the server 100. [

A user who wishes to upload a file can access the server 100 using the first terminal 200 and be allocated a storage space in advance.

A user who wishes to download a file can set a search time using the second terminal 300 and transmit the search formula to the server 100. [

Then, the server 100 may analyze the search formula received from the second terminal 300 to detect a file corresponding to the search formula, and may transmit information on the detected file to the second terminal 300.

The server 100 will be described in more detail with reference to FIG.

2, the server 100 includes a file management unit 110, an authentication information management unit 120, an identification number management unit 130, a search formula analysis unit 140, a file providing unit 150, a receiver identification information management unit 160, a communication unit 170, a memory unit 180, and a control unit 190.

The file management unit 110 can classify and manage information about files according to their types.

The authentication information management unit 120 can manage the authentication information set and transmitted by the first terminal 200. [

The identification number management unit 130 may assign a file identification number to a file registered by a user of the first terminal 200 and manage the assigned file identification number.

Also, the identification number management unit 130 may assign a personal identification number to the user of the first terminal 200 uploading the file, and manage the personal identification number.

The search formula analyzer 140 analyzes the search formula transmitted and set by the second terminal 300 and extracts a product corresponding to the search formula.

The file providing unit 150 may provide information on the extracted file to the second terminal 300 according to the result of the analysis by the search formula analyzing unit 140. [

The receiver identification information management unit 160 can manage the identification information corresponding to the receiver.

The communication unit 180 may communicate with the first terminal 200 and / or the second terminal 300.

The memory unit 181 can store data and programs necessary for file search. The memory unit 181 may store information on the file, information on the file uploader (user of the first terminal 200), and information on the file downloader (user of the second terminal 300).

The control unit 182 can control the overall operation and function of the search system 10. [

A file search method using an identification number applied to the search system 10 will be described with reference to the accompanying drawings.

3 to 11 are diagrams for explaining a file search method using an identification number according to the present invention. In the following, description of the parts described above may be omitted.

3, the user of the first terminal 200, that is, the file uploader, can transmit information on the first terminal 200 to the server 100 and register the information using the first terminal 200 (S100).

In addition, the user of the first terminal 200 can secure a storage space for storing the file in the first server 100 through a membership subscription method or the like.

Then, in the server 100, the first terminal 200 may assign a personal identification number to the user and store information about the personal identification number (S110). Hereinafter, the personal identification number may be regarded as an identification number corresponding to the user of the first terminal 200.

For example, as in the case of FIG. 4, the personal identification number 1231 is assigned to the A user, the personal identification number 1232 is assigned to the B user, the personal identification number 1233 is assigned to the C user, A personal identification number 1234 may be assigned.

This personal identification number can be set manually by the user. Alternatively, the server 100 may automatically assign the individual identification information corresponding to the user.

Then, the user of the first terminal 200 can transmit / store the information about the file to the server 100 using the first terminal 200 (S120).

Then, the server 100 may allocate a file identification number to the file and store information about the file identification number (S130).

For example, as in the case of Fig. 5, the file identification number is assigned to the authorized certificate file 01, the file identification number is assigned to the home document 02, and the file identification number to 03 is assigned to the contract have.

Thereafter, the second terminal 300 can input a predetermined search formula (S140). In addition, the second terminal 300 may transmit the input search formula to the server 100 (S150).

The search expression may include a personal identification number, a special symbol, and a file identification number. In addition, the special symbol may include at least one of a shop (#) and a star. The special designations applicable in the present invention may not be limited to the shop (#) and the star.

It may be desirable for the special symbol in the search expression to be located between the personal identification number and the file identification number. In this case, the server 100 can more easily distinguish the personal identification number and the file identification number.

In addition, the search formula may be input to a dial input window of the second terminal 300.

6, a search expression composed of a personal identification number 1234, a special symbol # and a file identification number 03 is input to the dial input window DIW of the second terminal 300 can do.

If the call key CK is selected in the state that the search expression is input to the dial input window DIW, the search function can be transmitted to the server 100 without executing the call function (S150). If the special symbol is not used, the second terminal 300 will attempt to call the number entered in the dial input window.

Then, the server 100 may analyze the search formula transmitted by the second terminal 300 (S160).

For example, the server 100 analyzes the identification number located at the front end of the special symbol based on the special symbol, identifies the user (individual), analyzes the identification number located behind the special symbol, .

In addition, the server 100 detects and extracts a file corresponding to the search formula based on the analysis result of the search formula (S170). (File information) of the extracted file to the second terminal 300 (S180).

Then, as in the case of FIG. 7, information about the file corresponding to the search formula may be displayed on the screen of the second terminal 300 (S190).

On the other hand, the order of the personal identification number and the file identification number in the search formula may be changed. For example, as in the case of FIG. 8, it is possible that the file identification number 03, the special symbol #, and the personal identification number 1234 are arranged in order in the search formula.

In the above description, a method of searching for a product by selecting a call key (CK) in a state that a search expression is input in the dial input window DIW has been described, but the present invention is not limited thereto.

For example, as in the case of FIG. 9, it is possible to search for a desired commodity by selecting a search key (LMK) for retrieving a commodity in a state in which a search expression is input to the dial input window DIW.

It is possible to create a search expression using only the personal identification number and the special symbols. In this case, information on the user corresponding to the personal identification number can be displayed on the second terminal 300.

For example, assume that a search expression of 1234 # is input to the dial input window DIW of the second terminal 300, as in the case of FIG. 10 (A). Here, 1234 may be a personal identification number.

In this case, as shown in FIG. 10B, the server 100 may transmit information on the user corresponding to the personal identification number 1234 to the second terminal 300.

For example, information about the files stored in the storage space set by the user corresponding to the personal identification number 1234 is transmitted to the second terminal 300, and this information is displayed on the screen of the second terminal 300 .

In this situation, the user of the second terminal 300 may be able to select and download at least one of the files displayed on the second terminal 300.

The personal identification number may also be set based on information that can identify the user.

For example, as in the case of Fig. 11, the personal identification number may include at least one of a resident registration number, a telephone number, and a social security number.

If the telephone number is used as a personal identification number, a search expression such as 01088888888 # 88 may be used.

If the search expression 01088888888 # 88 is interpreted, it can be interpreted that the file corresponds to the 88th file stored in the storage space corresponding to the user having the telephone number of 01088888888.

12 to 16 are diagrams for explaining a file searching method using a folder identification number. In the following, description of the parts described above may be omitted.

As shown in FIG. 12, the folder stored in the storage space corresponding to the user A (user) may include a contract folder, a business file folder, and a miscellaneous folder.

In addition, contract 1, 2, 3, 4, and 5 contract files can be stored in the contract folder.

As described above, it is possible to allocate at least one folder to the storage space of the A user allocated to the server 100, and to store a predetermined file in at least one folder.

Alternatively, it is also possible that a predetermined file is immediately stored in the storage space of the A user allocated to the server 100. [

A folder identification number can be assigned to each folder. For example, as in the case of Fig. 13, it is possible to assign a folder identification number of 001 to a contract folder, a folder identification number of 002 to a business folder, and a folder identification number of 003 to a miscellaneous folder .

In addition, the folder identification number can be stored in the server 100.

In this case, the search expression may include a personal identification number, a folder identification number, a special symbol, and an eight-mile identification number.

The special symbols may include a first special symbol and a second special symbol to distinguish the personal identification number, the folder identification number, and the file identification number.

For example, as in the case of FIG. 14A, a predetermined user may be able to input a search expression of 1234 # 001 # 03 into the dial input window DIW of the second terminal 300. Such a search expression may include a personal identification number 1234, a first special symbol #, a folder identification number 001, a second special symbol #, and a file identification number 03 in this order.

When the search expression of 1234 # 001 # 03 is analyzed, the file identification number stored in the folder having the folder identification number 001 among the folders stored in the storage space of the server 100 corresponding to the user assigned with the personal identification number 1234 is 03 It can be interpreted as requesting information about a file.

Alternatively, the search formula may be configured in a different order from that of FIG. 14 (A). For example, as shown in FIG. 14B, the search formula includes a file identification number 03, a first special symbol #, a folder identification number 001, a second special symbol #, a personal identification number 1234 ) In order.

As such, the first special symbol in the search expression may be located between the personal identification number and the folder identification number to distinguish the personal identification number and the folder identification number.

The second special symbol may be located between the folder identification number and the file identification number to distinguish the folder identification number from the file identification number.

At least one of the first special symbol and the second special symbol may include at least one of a shop (#) and a star.

For example, as shown in FIG. 15A, the first special symbol may be a shop (#), and the second special symbol may be an asterisk.

Conversely, as shown in FIG. 15B, the first special symbol may be an asterisk and the second special symbol may be a shop (#).

It is possible to create a search expression with a personal identification number and a first special symbol. In this case, information on at least one folder stored in the storage space allocated to the user corresponding to the personal identification number may be displayed on the screen of the second terminal 300.

For example, assume that a search expression of 1234 # is input to the dial input window DIW of the second terminal 300, as in the case of FIG. 16A. Here, 1234 is a personal identification number, and # is a first special symbol.

In this case, as shown in FIG. 16B, information on at least one folder included in the storage space allocated to the user corresponding to the personal identification number 1234 may be displayed on the screen of the second terminal 300.

The user may be able to download the desired file by searching at least one folder displayed on the screen of the second terminal 300. [

17 to 20 are diagrams for explaining a method of using authentication information. In the following, description of the parts described above may be omitted.

Referring to FIG. 17, in step S230, the first terminal 200 can set authentication information after the file identification number is allocated / stored (S130).

Here, the authentication information can be regarded as information for setting security in a predetermined file, a predetermined folder, or an entire storage space allocated to a user. Such authentication information may include at least one of an ID and a password.

That is, setting the authentication information means that the security is set by using the authentication information.

18, the second terminal 300 inputs authentication information together with a search formula (S210) to access a predetermined file stored in the server 100 by the first terminal 200, , And transmits the input search formula and authentication information to the server 100 (S220).

18 can be regarded as a case where the authentication information includes the password having the value '1111'. As described above, the authentication information can be connected to the search formula through a predetermined special symbol.

Then, the server 100 can analyze the search formula and the authentication information (S230).

If the authentication information transmitted from the second terminal 300 matches the authentication information set by the first terminal 200 as a result of the analysis in the server 100, (Transfer) the file of the second terminal 300 to the second terminal 300.

As described above, when the authentication information is used, the user of the first terminal 200 can protect important files.

Meanwhile, the second terminal 300 can be requested to input authentication information from the server 100 in the process of accessing a predetermined file. The following will be described with reference to FIGS. 19 to 20 attached hereto.

19, the server 100 analyzes the search formula transmitted from the second terminal 300 (S160), and determines whether or not security is set in the file to which the second terminal 300 accesses (S300).

If it is determined in step S300 that security is set, the server 100 may request the second terminal 300 to input authentication information (S310).

In this case, an input window for inputting authentication information may be displayed on the screen of the second terminal 300, as in the case of FIG.

When the user of the second terminal 300 inputs the authentication information to access the file set by the first terminal 200 and transmits the authentication information to the server 100 in operation S320, (S330) whether the authentication information input by the user of the second terminal 300 matches the authentication information set by the first terminal 200 user.

As a result of the determination in step S330, if a match is found, a file corresponding to the search formula input by the second terminal 300 is detected (S170), and the detected file can be transmitted to the second terminal 300 (S180 ).

On the other hand, if it is determined as a result of the determination in step S330 that no matching is performed, another predetermined function (Default 1) may be performed (S340). For example, it is possible to transmit to the second terminal 300 notification information indicating that the inputted authentication information is incorrect authentication information.

As described above, it is to be understood that the technical structure of the present invention can be embodied in other specific forms without departing from the spirit and essential characteristics of the present invention.

It should be understood, therefore, that the embodiments described above are to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than the foregoing description, And all changes or modifications derived from equivalents thereof should be construed as being included within the scope of the present invention.

Claims (7)

Assigning a user's personal identification number;
Assigning a file identification number to a file corresponding to the user;
Storing the personal identification number, the file identification number, and the file in a server;
An input step of inputting a search expression including the personal identification number, the special symbol, and the file identification number in the first terminal;
Detecting a file corresponding to the search formula among the files stored in the server; And
The server transmitting the detected file to the first terminal;
The file management method comprising:
The method according to claim 1,
Wherein the special symbol in the search expression is located between the personal identification number and the file identification number.
3. The method of claim 2,
Wherein the special symbols include at least one of a shop (#) and a star.
The method according to claim 1,
The input step
Inputting the search expression into a dial input window of the first terminal; And
Selecting a call key in a state where the search expression is input to the dial input window;
≪ / RTI >
The method according to claim 1,
Wherein the personal identification number comprises at least one of a resident registration number, a telephone number, and a social security number.
The method according to claim 1,
Further comprising setting security by assigning authentication information to a file corresponding to the user.
The method according to claim 6,
Further comprising inputting the authentication information to access the secured file at the first terminal.
KR1020160088913A 2016-07-13 2016-07-13 File Searching Method using Identification Number KR20180007629A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR1020160088913A KR20180007629A (en) 2016-07-13 2016-07-13 File Searching Method using Identification Number
PCT/KR2016/007653 WO2018012649A1 (en) 2016-07-13 2016-07-14 File search method using identification number

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160088913A KR20180007629A (en) 2016-07-13 2016-07-13 File Searching Method using Identification Number

Publications (1)

Publication Number Publication Date
KR20180007629A true KR20180007629A (en) 2018-01-23

Family

ID=60952107

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160088913A KR20180007629A (en) 2016-07-13 2016-07-13 File Searching Method using Identification Number

Country Status (2)

Country Link
KR (1) KR20180007629A (en)
WO (1) WO2018012649A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102243130B1 (en) * 2020-08-19 2021-04-22 주식회사 잉크와오피스 Unmanned print processing system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833294B (en) * 2011-06-17 2015-05-20 阿里巴巴集团控股有限公司 File processing method and system based on cloud storage, and server cluster system
CN103685337B (en) * 2012-08-31 2018-03-27 腾讯科技(深圳)有限公司 Method, terminal device and the transfer server of shared file
KR20150080722A (en) * 2014-01-02 2015-07-10 주식회사 마이드라이브스 Apparatus and Method for managing files
KR101590554B1 (en) * 2014-09-25 2016-02-01 이주형 Method and apparatus for uploading or downloading file based on tag
KR20150013095A (en) * 2014-09-29 2015-02-04 주식회사 제이투엔 Method and user device for code-based access to other device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102243130B1 (en) * 2020-08-19 2021-04-22 주식회사 잉크와오피스 Unmanned print processing system

Also Published As

Publication number Publication date
WO2018012649A1 (en) 2018-01-18

Similar Documents

Publication Publication Date Title
CN105610949B (en) Resource data use permission sharing method, device and system
JP6568355B2 (en) Method and apparatus for mutual communication of accounts between apps
US20160232374A1 (en) Permission control method and apparatus
EP3229400B1 (en) Password push method, push system, and terminal device
RU2673401C2 (en) Method and device for obtaining certification document
US20140250105A1 (en) Reliable content recommendations
CN105721425B (en) information processing method and electronic equipment
CN105207985A (en) Application program login method and mobile terminal
CN110581835A (en) Vulnerability detection method and device and terminal equipment
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
US10162488B1 (en) Browser-based media scan
US9430625B1 (en) Method and system for voice match based data access authorization
US9591056B2 (en) Techniques for contact exporting
US10070308B2 (en) Systems and methods for protecting mobile contact information
KR20180007629A (en) File Searching Method using Identification Number
WO2017080217A1 (en) Method of recommending video via bluetooth, mobile terminal and in-car video player
US9998609B2 (en) System and method for detecting and alerting risks of inputting incorrect account information in refill transactions
CN105354506A (en) File hiding method and apparatus
US10764301B2 (en) Method and system for user authentication based on a visual representation of user location
CN112256654B (en) Document sharing method and device
WO2015081834A1 (en) Method and apparatus for distinguishing software types
KR20180007630A (en) File Searching Method using Identification Number
EP3029584A1 (en) Content providing system and content providing method thereof
EP2795469B1 (en) Methods, nodes, and computer programs for activating remote access
US20150302059A1 (en) Content recommendation apparatus and the method thereof

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application