CN109858226A - The safeguards system of networking storage safety - Google Patents
The safeguards system of networking storage safety Download PDFInfo
- Publication number
- CN109858226A CN109858226A CN201910101095.9A CN201910101095A CN109858226A CN 109858226 A CN109858226 A CN 109858226A CN 201910101095 A CN201910101095 A CN 201910101095A CN 109858226 A CN109858226 A CN 109858226A
- Authority
- CN
- China
- Prior art keywords
- compiler
- networked devices
- code
- networking
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of safeguards systems of networking storage safety.Including various wired and wireless communication equipments and associated device, the compiler of wired and wireless connection absolute construction is capable of with each networked devices;Before using networked devices, the data information of networked devices or network storage space will be needed to be stored in, it is independently to select the code form set row networking input again by compiler overall conversion, or it sets compiler to when using equipment networking, the data information and manipulation instruction that need to network and store directly are converted to code form input by compiler, make to be deposited in each data information on networked devices and network storage space, it is the code that correct information can only be interpreted by specific compiler, can solid guarantee people using networked devices and network storage space safety.
Description
Technical field
The present invention relates to the security fields in the application of the usual network equipment, more particularly, to a kind of guarantor of networking storage safety
Barrier system.
Background technique
Currently, well known with social development and scientific and technological progress, people's lives are horizontal and working environment and various conditions
All quickly improved, in our daily lifes and work, the wired or wireless communication equipment of a multitude of names, computer, mobile phone and
Phone etc., and related networked devices using increasing and up to becoming basically universal, and they increasingly become people and work life
Indispensable a part, all brings great convenience to us in terms of many in work, and network cloud era arrives in effectiveness
It constantly extending in level and is promoted perfect, brand-new prospect style and features will be showed for us, but things inevitably always has
Its dual character also just can't do without that certain puzzlement can be caused to us, everybody relatively has personal understanding, in computer and mobile phone
What upper browsing search paid close attention to, and will soon emerge interior perhaps advertisement windows class associated therewith frequently on the page, more
Have notably, what process everybody usually application product or passes by, and can also make us impossible to guard against cuts information in virtually
Leakage is taken, more irritating also many enterprises make use of scientific and technical innovation or skilful brill policy management loophole, ignore individual privacy and enterprise
Public institution's classified information basic equity having and legal provisions, instead to have a skill in this respect or equipment is shown off and lets others have a look at, and
Using them as the tool and capital played one's own game, ordinary people know obviously existing many confusions obviously with state's laws regulation
It disagrees, but also can only have no way out helplessly, cannot be neglected and more there is the security risk that criminal's malice is stolen secret information, have
A bit in line platform while solving the problems, such as various in life and work for society, the institute being collected into from user is also utilized
There is behavioural information to accumulate additional data source ... ... that is, actually we using networked devices and are storing various data
When, the risk for having data information to be easily lost by intentional steal and unintentionally, each New technical use is easier by people when more
Careless omission weak point is found, cloud is followed hard on and gradually spreads out the safety guarantee that need to focus on, is equally worth everybody to make great efforts diligently conscientiously right
To.
Summary of the invention
It is an object of the invention to solve safety problem present in existing networked devices application, a kind of be suitable for respectively is provided
The safeguards system of the wired and wireless equipment networking storage safety of kind.
To achieve the goals above, the present invention is mainly addressed by the following technical solutions: a kind of networking storage
The safeguards system of safety can be wired with each networked devices including various wired and wireless communication equipments and associated device
With the compiler for being wirelessly connected absolute construction;Will need to be stored in networked devices or network storage before using networked devices
The data information in space is independently to select the code form set row networking input again, or compiler is set by compiler overall conversion
It is set to when using equipment networking, the data information and manipulation instruction that need to network and store directly is converted to generation by compiler
Code form input, makes to be deposited in each data information on networked devices and network storage space, being can only be by specific compiling
Device interprets the code of correct information;Compiler maltilevel security is set up defences, and prediction scheme is on-demand and can temporarily to adjust the structure of variation special
Property, even if compiler loses or networked devices and network storage space are encroached on, it can take that obtain also be not to the point a bit entirely
Invalid information, can solid guarantee people using networked devices and network storage space safety;
Actuating type is incuded in the conditions for use of setting and obtains personal biology characteristics information as confirmation by the compiler
The necessary link of authorized person's authentication.
Wherein, the compiler can be set as autonomous entity confirmation form of authorisation and directly enable, or with major-minor point duty
Formula authorization enabling and hierarchical decontrol different rights, and permit enabling and authorization using level crossing supervision form of authorisation.
Wherein, the compiler can will edit and translate the structure type for being divided into two parts in function and independently disposing
It lays, in favor of security control and priority assignation.
Wherein, the compiler can pre-set code scheme and be supplied to user's selection, or can allow and make
Structure type of the user from main modulation edit code scheme;Convert each networked devices can by compiler on demand, in real time with
Code form manipulation and retention information, or the information translation retained is extracted by compiler and reads out true content.
Wherein, each networked devices can be acted on by compiler, make do not change apparently each one usually like habit behaviour
Make and shows, it is real to retain or transmit information by the conversion substitution of code synchronisation;Or information is chosen before retention or outgoing by compiling
Translating device overall conversion is that code form reconnects networked devices.
Wherein, the compiler can take various graphic symbol markings, text, number or audio frequency effect class conduct
Code can choose the single kind and be used as code, or constitute code, and choosing using different characters or audio combination
Certain a part selected in ready-made literary works or information document class is used as code.
Wherein, the compiler, can will edit and translation function is divided into two completely self-contained structural units, just
It is retained in the provisional transmission of authorisation process respectively or information is read out in translation, be conducive to orientation application specific architecture form setting.
Wherein, the compiler can preset more set code schemes before use, random when so as to working application
Prediction scheme is selected in automatic selection or manual operation, and is implemented using temporary changes Adjusted Option.
Wherein, when the compiler need to be matched with the compiler that matches, the code prediction scheme that will can be selected in advance,
It is transferred to designated terminal authorized person, or the pipeline by separately about setting in the form of separately setting agreement private mark, by selected code prediction scheme
And the scheme of temporary changes adjustment, it is transferred to the authorized person of designated terminal.
Preferably, the compiler induction obtains personal biology characteristics information, with what need to unavoidably be touched when in use
Finger tip pulse transducer is arranged in position, the necessary link as confirmation authorized person's authentication.
Preferably, the compiler, can be set as after pausing in using operation more than the setting time limit, or
When operating conversion instruction, follow-up induction obtains personal biology characteristics information, with the legitimacy of confirmation operation person's identity.
Preferably, the compiler is configured to abutting joint dedicated anti-divulge a secret Code Edit and translation
Application software form, after being authenticated by particular safety, by pre-set code scheme or temporarily specified code form is being networked
Real information is retained, transmits or read in equipment and is matched with the compiler that matches.
Preferably, the compiler, in the unlatching of connection networked devices in application, with eye-catching mark, caution sound or voice,
Prompt user is in unlatching code conversion state can disconnect compiler line with benefit when not needing code conversion in time
And such as it is often used networked devices.
Preferably, the compiler, is arranged in a connection networked devices use and operates intermittent time value, with
Pause reaches that setting time is just automatic to disconnect compiler connection, to it is continuous with the condition that must enable access setting by authorization and
Authentication.
Preferably, the compiler, can be set as when with code transfer data information, as desired for difference
Networked devices terminal, take the different data information of identical code scheme transmission, otherwise can also use different codes
Scheme, to the different identical data informations of networked devices terminal transmission.
Preferably, wireless communication module can be set on the compiler and show warning device, it is unauthorized when having
When people employs, presents at once and remind or make warning, and reach setting time immediately to donor or preset terminal in warning
Send warning message.
Preferably, the compiler to be designed as conventional universal application software form, press convenient for each networked devices
It needs independently to download and use, or the application module form in new design networked devices and device, set to simplify product structure
It sets and monoblock type application.
Preferably, can set the compiler in networking, committee asks network service platform or network
Security control platform is responsible for monitoring prevention and in time disposition unusual condition, has constructed reliable protection net for system general safety.
It will be evident that the present invention with advantages of simple and be easy to implement structure lay, system enhancing the prior art protection
On the basis of structural measure, the compiler of traditional networked devices use habit is substituted by the code conversion form that can be changed at random, is passed through
It is multiple reliably set up defences and authorize identity stringent actual effect authenticate and active prediction scheme it is optional and energy covariant Adjusted Option it is flexible
Property, various networked devices terminals can be effectively prevent, they and data manage the information transmission at center or divulge a secret and invade in storing
It disturbs, even if being cracked, it is also not to the point with substantive content to see having occurrence of equipment or data information to be stolen, compiles
Translate device conditions for use to obtain personal biology characteristics information as authorization authentication and many-sided comprehensive control of limiting, actually
Can accomplish to be difficult to be cracked, can more be set as under certain condition can from the information of random code scheme and retention, even be pin
Ruin whole data informations;That is the present invention select on demand code implement networked devices retain and transmitting data information knot
Structure feature ingenious can ensure networking transport and storage safety between each communication equipment, reach make illegal person have no way of doing it practical
Effect, the trouble and worry that more satisfactory can be released people and use networked devices secure context.
The present invention is with following the utility model has the advantages that advantages of simple and the structure for being easy to implement laying, more satisfactory can solve
Various networked devices are easily encroached on and are divulged a secret problem, the solid peace for ensureing people and applying networked devices and storing data information
Entirely.
Specific embodiment
A kind of safeguards system of networking storage safety, does further describe below.
Embodiment: a kind of safeguards system of networking storage safety, including various wired and wireless communication equipments, such as electricity
Brain, mobile phone, wearable device, phone and networking data control center etc., and with their associated equipment, with each networked devices
It is capable of the compiler of wired and wireless connection absolute construction;It can be chosen at using before networked devices, needs are stored in networking
The data information of equipment or network storage space, first by compiler overall conversion, independently to select the code form set, row networking is defeated again
Enter equipment transmission or save, or compiler is arranged and is adjusted to when using equipment networking, just directly by compiler needing
The data information and manipulation instruction networked and stored are converted to the transmission of code form input equipment or save, and make to be deposited in networking
Each data information in equipment and network storage space is that can only interpret correct information by specific authorized compiler
Code;Compiler is on-demand and can temporarily adjust the architectural characteristic of variation with maltilevel security prediction scheme of setting up defences, even if just in case compiling
Translate that device is lost or networked devices and network storage space are encroached on, can by take obtain be also all a bit with substantive content root
This not to the point invalid information, can solid guarantees people it is safe using networked devices and network storage space;It is described
Compiler, in the conditions for use of setting, by actuating type incude obtain personal biology characteristics information setting be confirmation authorized person
The necessary link of authentication.In implementation, the compiler can be set as autonomous entity confirmation form of authorisation and directly open
With, or divide duty formula authorization enabling and hierarchical to decontrol different rights with major-minor, and permit using level crossing supervision form of authorisation
It enables and authorizes, can be different applicable group's specific aim customizations;It can will edit and translate and be divided into two parts independence in function
The structure type of disposition is laid, in favor of security control and priority assignation;Code scheme can be pre-set and be supplied to use
Person's selection, or user can be allowed from the structure type of main modulation edit code scheme;Lead to each networked devices can on demand
Compiler conversion is crossed, manipulates and retain in real time information with code form, or retained information translation is extracted by compiler and is read
Take out true content;Various graphic symbol markings, text, number or audio frequency effect class can be taken as code, can be chosen
Single kind in described is used as code, or constitutes code, and the ready-made literature of selection using different characters or audio combination
Certain a part in works or information document class is used as code;Can will editor and translation function be divided into two it is completely self-contained
Structural unit product is retained or is translated in order to the provisional transmission of authorisation process respectively and reads out information, is conducive to orient dedicated
Structure type setting;More set code schemes can be preset, before use convenient for that can select automatically at random when working application
Or prediction scheme is selected in manual operation, and is practiced using temporary changes Adjusted Option;Each networked devices are enable to pass through compiler
Effect reaches the habit operation and show for not changing that each one usually likes apparently, and the real conversion substitution by code synchronisation is stayed
Information is deposited or transmits, or selecting information is that code form reconnection networking is set by compiler overall conversion before retention or outgoing
It is standby;It, can be in advance by selected code prediction scheme, separately to set agreement when the compiler need to be matched with the compiler that matches
The form of private mark is transferred to designated terminal authorized person, or the pipeline by separately about setting, by selected code prediction scheme and temporary changes
The scheme of adjustment is transferred to the authorized person of designated terminal.Each in summary of the invention preferably, can in specific implement basis
It is applicable in group and occasion difference and makes appropriate adjustment, the compiler induction obtains personal biology characteristics information, with when in use
The position setting finger tip pulse transducer that need to unavoidably touch, as the necessary link of confirmation authorized person's authentication, main
Eye is reliable easy in authorization legitimacy certification;The compiler, can be set as pausing in using operation is more than setting
After time limit, or when operating conversion instruction, follow-up induction obtains personal biology characteristics information, just with confirmation operation person's identity
The property worked as, the main guarantee safety considered in use;By the compiler, it is configured to the dedicated anti-code of divulging a secret of abutting joint
The application software form of editor and translation, after being authenticated by particular safety, by pre-set code scheme or temporarily specified generation
Code form is retained in networked devices, transmits or is read real information and match with the compiler that matches, is mainly in view of
There is pairing use demand in reality;The compiler is opened in connection networked devices in application, with eye-catching mark, warning
Sound or voice, volume can be disconnected with benefit when not needing code conversion in time by prompting user to be in unlatching code conversion state
It translates device line and is such as often used networked devices, predominantly prevent any possible security risk;The compiler, setting one
Intermittent time value is operated in a connection networked devices use, just the automatic compiler that disconnects connects to reach setting time in pause
It connects, to continuous with the condition and authentication of access setting must be enabled by authorization, in order that guaranteeing reliable and secure;Described
Compiler can be set as when with code transfer data information, as desired for different networked devices terminals, be taken same
Code scheme transmits different data information, otherwise can also use different code schemes, whole to different networked devices
Identical data information is transmitted at end, fully demonstrates the present invention and ensures the autonomous personalized initiative and flexible property of safety;It can be described
Compiler on setting wireless communication module and show warning device, when there is unauthorized people to employ, present at once and remind or make
Warning, and reach setting time in warning and send warning message to donor or preset terminal immediately, in order that from multi-angle
Ensure equipment safety;By the compiler, it is designed as conventional universal application software form, as needed convenient for each networked devices
Autonomous downloading uses, or the application module form in new design networked devices and device, so as to simplify product structure setting and
Monoblock type application mainly considers from the different applicable situation demands of new design networked devices and device;It can be by the compiling
Device is set as in networking, and committee asks network service platform or network security supervising platform to be responsible for monitoring prevention and disposition in time
Unusual condition has constructed reliable protection net for system general safety, is thinking multiple authorization identity can be used true when necessary
Recognize, such as combines common video monitoring, face or eye iris and finger print information identification, it is powerful by society and the network platform
Resource strength can implement comprehensive on-demand supervision, if monitoring that network or networked devices have unusual condition, can be arranged
After the authorized data for taking good care of retention by network service platform or the transfer reinforcing of network security supervising platform, instruction translator is certainly
It destroys disorderly or certainly and has information, complementary advantage can more will do one's bit for cloud era network security.
Obviously, those skilled in the art can carry out various changes without departing from this hair to structure setting of the invention
Bright scope.Therefore, if these changes belong in claims of the present invention and its equivalent technical scope, this hair
It is bright to be also intended to cover these changes.
Claims (10)
1. a kind of safeguards system of networking storage safety, which is characterized in that including various wired and wireless communication equipments and phase
Associate device is capable of the compiler of wired and wireless connection absolute construction with each networked devices;To incite somebody to action before use networked devices
The data information for needing to be stored in networked devices or network storage space is independently to select the code shape set by compiler overall conversion
Formula row networking input again, or set compiler to when using equipment networking, directly needs are networked and stored by compiler
Data information and manipulation instruction be converted to code form input, make to be deposited in each number on networked devices and network storage space
It is believed that breath, is the code that can only interpret correct information by specific compiler;Compiler maltilevel security prediction scheme of setting up defences is on-demand
With the architectural characteristic that can temporarily adjust variation, even if compiler loses or networked devices and network storage space are encroached on,
Can take that obtain also be a little not to the point invalid information entirely, can solid guarantees people use networked devices and network storage
Space safety;
Actuating type is incuded in the conditions for use of setting and obtains personal biology characteristics information as confirmation by the compiler
The necessary link of authorized person's authentication.
2. the safeguards system of networking storage safety according to claim 1, which is characterized in that the compiler induction obtains
Personal biology characteristics information is arranged finger tip pulse transducer with the position that need to unavoidably touch when in use, authorizes as confirmation
The necessary link of person's authentication.
3. the safeguards system of networking storage safety according to claim 1, which is characterized in that the compiler, it can
It is set as after pausing in using operation more than the setting time limit, or when operating conversion instruction, follow-up induction obtains a life
Object characteristic information, with the legitimacy of confirmation operation person's identity.
4. the safeguards system of networking storage safety according to claim 1, which is characterized in that by the compiler, if
It is set to the application software form for capableing of abutting joint dedicated anti-divulge a secret Code Edit and translation, convenient for authenticating by particular safety
Afterwards, by pre-set code scheme or temporarily specify code form, in networked devices retain, transmit or read real information and with
The compiler that matches matches.
5. the safeguards system of networking storage safety according to claim 1, which is characterized in that the compiler, even
It connects networked devices to open in application, with eye-catching mark, caution sound or voice, prompts user to be in and open code conversion shape
State can disconnect in time compiler line and such as be often used networked devices with benefit when not needing code conversion.
6. the safeguards system of networking storage safety according to claim 1, which is characterized in that the compiler, setting
As soon as operating intermittent time value in connection networked devices use, compiler company is disconnected automatically to reach setting time in pause
It connects, to continuous with the condition and authentication that must enable access setting by authorization.
7. the safeguards system of networking storage safety according to claim 1, which is characterized in that the compiler, it can
It is set as when with code transfer data information, as desired for different networked devices terminals, takes identical code scheme biography
Defeated different data information, on the contrary different code schemes can be also used, it is identical to different networked devices terminal transmissions
Data information.
8. the safeguards system of networking storage safety according to claim 1, which is characterized in that can be in the compiler
Upper setting wireless communication module and show warning device, when there is unauthorized people to employ, presents remind or make warning at once, and
Warning reaches setting time and sends warning message to donor or preset terminal immediately.
9. the safeguards system of networking storage safety according to claim 1, which is characterized in that by the compiler, if
It is calculated as conventional universal application software form, independently downloading uses as needed convenient for each networked devices, or new design networking is set
Application module form in standby and device, to simplify product structure setting and monoblock type application.
10. the safeguards system of networking storage safety according to claim 1, which is characterized in that can be by the compiling
Device is set as in networking, and committee asks network service platform or network security supervising platform to be responsible for monitoring prevention and disposition in time
Unusual condition has constructed reliable protection net for system general safety.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910101095.9A CN109858226A (en) | 2019-01-31 | 2019-01-31 | The safeguards system of networking storage safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910101095.9A CN109858226A (en) | 2019-01-31 | 2019-01-31 | The safeguards system of networking storage safety |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109858226A true CN109858226A (en) | 2019-06-07 |
Family
ID=66897339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910101095.9A Pending CN109858226A (en) | 2019-01-31 | 2019-01-31 | The safeguards system of networking storage safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109858226A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111611565A (en) * | 2020-05-11 | 2020-09-01 | 叶春林 | Autonomous reaching type safety verification system |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08235114A (en) * | 1995-02-28 | 1996-09-13 | Hitachi Ltd | Server access method and billing information management method |
US20060053147A1 (en) * | 2004-09-09 | 2006-03-09 | Microsoft Corporation | Method, system, and apparatus for configuring a data protection system |
CN101159547A (en) * | 2007-11-07 | 2008-04-09 | 合肥讯天信息技术有限公司 | Dynamic secret method of text information input, output and transmission |
CN101692293A (en) * | 2009-08-21 | 2010-04-07 | 北京维深数码科技有限公司 | Method and system for operating programmer on basis of face recognition technology |
CN102789563A (en) * | 2012-07-19 | 2012-11-21 | 无锡华御信息技术有限公司 | Protecting system for information safety of website background program and protecting method thereof |
CN103034522A (en) * | 2011-10-07 | 2013-04-10 | 鸿富锦精密工业(深圳)有限公司 | Automatic compiling method and system |
CN103514156A (en) * | 2013-09-09 | 2014-01-15 | 武汉传神信息技术有限公司 | Method for translating network communication text in transmission process |
CN104363232A (en) * | 2014-11-03 | 2015-02-18 | 叶春林 | Anti-disclosure structure mode in daily communication |
CN104978191A (en) * | 2015-06-24 | 2015-10-14 | 小米科技有限责任公司 | Application deployment method and server |
US20160274877A1 (en) * | 2015-03-20 | 2016-09-22 | Fujitsu Limited | Method of compiling a source code, storage medium, and apparatus |
CN106133684A (en) * | 2014-03-27 | 2016-11-16 | 微软技术许可有限责任公司 | Support the dynamic behaviour in static compilation program |
-
2019
- 2019-01-31 CN CN201910101095.9A patent/CN109858226A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08235114A (en) * | 1995-02-28 | 1996-09-13 | Hitachi Ltd | Server access method and billing information management method |
US20060053147A1 (en) * | 2004-09-09 | 2006-03-09 | Microsoft Corporation | Method, system, and apparatus for configuring a data protection system |
CN101159547A (en) * | 2007-11-07 | 2008-04-09 | 合肥讯天信息技术有限公司 | Dynamic secret method of text information input, output and transmission |
CN101692293A (en) * | 2009-08-21 | 2010-04-07 | 北京维深数码科技有限公司 | Method and system for operating programmer on basis of face recognition technology |
CN103034522A (en) * | 2011-10-07 | 2013-04-10 | 鸿富锦精密工业(深圳)有限公司 | Automatic compiling method and system |
CN102789563A (en) * | 2012-07-19 | 2012-11-21 | 无锡华御信息技术有限公司 | Protecting system for information safety of website background program and protecting method thereof |
CN103514156A (en) * | 2013-09-09 | 2014-01-15 | 武汉传神信息技术有限公司 | Method for translating network communication text in transmission process |
CN106133684A (en) * | 2014-03-27 | 2016-11-16 | 微软技术许可有限责任公司 | Support the dynamic behaviour in static compilation program |
CN104363232A (en) * | 2014-11-03 | 2015-02-18 | 叶春林 | Anti-disclosure structure mode in daily communication |
US20160274877A1 (en) * | 2015-03-20 | 2016-09-22 | Fujitsu Limited | Method of compiling a source code, storage medium, and apparatus |
CN104978191A (en) * | 2015-06-24 | 2015-10-14 | 小米科技有限责任公司 | Application deployment method and server |
Non-Patent Citations (2)
Title |
---|
李彤等: "STM32F10x的启动文件跳转攻击方案设计", 《单片机与嵌入式系统应用》 * |
杨培等: "BIOS安全防护技术研究", 《计算机工程与设计》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111611565A (en) * | 2020-05-11 | 2020-09-01 | 叶春林 | Autonomous reaching type safety verification system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101170409B (en) | Method, system, service device and certification server for realizing device access control | |
CN104167029A (en) | Intelligent lock and operation method thereof | |
CN102682506A (en) | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique | |
WO2003032126A3 (en) | Multi-factor authentication system | |
CN1937494A (en) | Electronic device control apparatus | |
KR20140046474A (en) | Communication method utilizing fingerprint information for authentication | |
CN102722921A (en) | Access control system | |
CN102118385A (en) | Security domain management method and device | |
WO2001043393A3 (en) | Decoupling access control from key management in a network | |
CN106100980A (en) | Instant messaging communication means end to end and device | |
KR100820671B1 (en) | Method and apparatus for setting access right to devices on network and authenticating between devices | |
CN109858226A (en) | The safeguards system of networking storage safety | |
CN108848503B (en) | A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis | |
CN106961326A (en) | POS terminal remote cipher key more new system and update method | |
CN107451647B (en) | Built-in safety mechanism's special SIM card of barracks | |
CN109547303A (en) | Control method and relevant device | |
CN112153072B (en) | Computer network information safety control device | |
JP4865349B2 (en) | Communication device and communication method | |
CN109949457A (en) | Intelligent door lock control method and relevant apparatus | |
Cisco | Index | |
Cisco | Index | |
Cisco | Index | |
CN103391187A (en) | Cloud storage safety control method | |
CN109286896A (en) | A kind of safe communication system based on apparatus management/control | |
CN102075541A (en) | Safe interoperation method for distributed multi-security domain heterogeneous information system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190607 |