CN103973712A - Access control method and device for network data - Google Patents
Access control method and device for network data Download PDFInfo
- Publication number
- CN103973712A CN103973712A CN201410231839.6A CN201410231839A CN103973712A CN 103973712 A CN103973712 A CN 103973712A CN 201410231839 A CN201410231839 A CN 201410231839A CN 103973712 A CN103973712 A CN 103973712A
- Authority
- CN
- China
- Prior art keywords
- network data
- access request
- information
- application
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an access control method and device for network data. The method comprises the following steps: receiving an access request of the network data from a client side, wherein the access request is sent by a user of the client side by means of an application on the client side, and comprises the identity information of the user, the identification information of the application and the address information of the network data; judging the legality of the access request according to the identity information and the identification information of the application; and if the access request is judged to be legal, permitting access to the network data correlated with the address information. Through the method and the device, better control of access to the network data can be realized.
Description
Technical field
The present invention relates to field of computer technology, be specifically related to Internet technical field, relate in particular to access control method and the device of network data.
Background technology
Along with the fast development as the information technology of representative taking internet, the large step of human society has marched toward cybertimes.Requirements for access about network data increases day by day, and the access of network data has become an important subject in data access.But, thereby how better the access of network data is controlled and realized that more effectively to protect and utilize network data be one of current problem facing.
Summary of the invention
In view of this, the application provides a kind of access control method and device of network data, solves the technical problem that above background technology part is mentioned.
On the one hand, the application provides a kind of access control method of network data, comprise: the access request from client to described network data, wherein, described access request is sent by means of the application in described client by the user of described client, described access request comprises: described user's identity information, the identification information of described application and the address information of described network data; According to the identification information of described identity information and described application, the legitimacy of described access request is judged; If judge that described access request is legal, allow the access of the described network data to being associated with described address information.
Further, described access request further comprises the operation information to described network data.
Further, describedly according to the identification information of described identity information and described application, the legitimacy of described access request is judged, comprising: according to the identification information of described identity information, described application and described operation information, the legitimacy of described access request is judged.
Further, described access request further comprises the address information of described client.
Further, describedly according to the identification information of described identity information and described application, the legitimacy of described access request is judged, comprising: according to the address information of the identification information of described identity information, described application and described client, the legitimacy of described access request is judged.
Further; described method also comprises: if judge that described access request is illegal; carry out one or more in following operation: the access of refusal to the described network data being associated with described address information; described network data is protected to operation, record the relevant information of described access request.
Accordingly, the application has also proposed a kind of access control apparatus of network data, comprise: receiver module, for the access request to described network data from client, wherein, described access request is sent by means of the application in described client by the user of described client, and described access request comprises: described user's identity information, the identification information of described application and the address information of described network data; Judge module, for judging the legitimacy of described access request according to the identification information of described identity information and described application; Authorization module, if judge that for described judge module described access request is legal, allows the access of the described network data to being associated with described address information.
Further, described access request further comprises the operation information to described network data.
Further, described judge module comprises: according to the identification information of described identity information, described application and described operation information, the legitimacy of described access request is judged.
Further; described device also comprises: protection module; if judge that for described judge module described access request is illegal; carry out one or more in following operation: the access of refusal to the described network data being associated with described address information; described network data is protected to operation, record the relevant information of described access request.
Access control method and the device of the network data that the application proposes have following features: the legitimacy of described access request is judged from the identification information of the identity information in the access request of client and application by basis, in the situation that to judge access request be legal and allow the access to described network data, realize the better control of the access to network data again.
Brief description of the drawings
By reading the detailed description that non-limiting example is done of doing with reference to the following drawings, it is more obvious that other features, objects and advantages of the present invention will become:
Fig. 1 is the flow chart of an embodiment of the access control method of the application's network data;
Fig. 2 is the structural representation of an embodiment of the access control apparatus of network data.
Embodiment
Below in conjunction with drawings and Examples, the application is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the application, but not restriction to the application.It also should be noted that, for convenience of description, in accompanying drawing, only show the part relevant to the application but not full content.
Fig. 1 is the flow chart of an embodiment of the access control method of the application's network data.The present embodiment is mainly applied to this access control method the system being made up of client and server and illustrates.Described server stores has network data and is associated with one or more clients.Described client can comprise smart mobile phone, panel computer, E-book reader, MP3 player (Moving Picture Experts GroupAudio Layer III, dynamic image expert compression standard audio frequency aspect 3), MP4 (Moving PictureExperts Group Audio Layer IV, dynamic image expert compression standard audio frequency aspect 3) player, pocket computer on knee and desktop computer etc.
In step 101, the access request from client to network data.
In the present embodiment, server that the access request of client the is processed server of store network data (for example, for) can by wired connection mode or wireless connections mode from described client the access request to network data.Described client to the access request of network data (is for example sent, RPC (the Remote Procedure Call that network data is read, remote procedure call) request) afterwards, can wait for by synchronous or asynchronous mode the response of described server.
Wherein, described access request is sent by means of the application in described client by the user of described client.For example, under (SuSE) Linux OS environment, described user can operate the application (such as file copy program) in described client, and the POSIX that described application provides by operating system (PortableOperating System Interface, POSIX) standard interface carries out read-write operation to the network data being stored on server.
In the present embodiment, access request comprises: user's identity information, the address information (for example URL (Uniform Resoure Locator, uniform resource locator) address information) of the network data of the identification information of application and expectation access.Described user's identity information can comprise with lower one or more: the account that user uses in the time of the above-mentioned client of login or above-mentioned application, for example user is at the UID of linux system (group ID, organize ID) or GID (user ID, i.e. user ID); Checking relevant information, such as encrypted message, verification code information etc.; Identity-related information, such as age information, post information etc.The identification information of initiating the described application of described access request can comprise with lower one or two: application identities symbol (program identifier), process indications (process identifier).
In the present embodiment, above-mentioned wireless connections mode includes but not limited to that 3G connection, WiFi connection, bluetooth connection, WiMAX connection, Zigbee connection, UWB (ultra wideband) connection or other future are by the wireless connections mode of developing.
In step 102, according to the identification information of identity information and application, the legitimacy of access request is judged.
In the present embodiment, above-mentioned server is from above-mentioned client to after the access request of network data, can resolve described access request, extract the address information of the identification information of the user's of the application in the described client of wherein included operation identity information, described application and the network data of expectation access.
Afterwards, described server, according to described identity information and described identification information, based on predetermined access control rule, judges the legitimacy of the access request of the network data that described address information is navigated to.Described access control rule can be such rule, and it has defined the condition that can conduct interviews to described network data.For example, described access control rule has defined following two conditions: the first, and user's that can accesses network data identity (obtaining the identity information from user) condition; The second, mark (obtaining the identification information of the self-application) condition of the application that user that can accesses network data uses.In the situation that above two conditions are all satisfied, it is legal that described server can be judged the access request of described network data.Certainly, also can be set as, the arbitrary condition in above two conditions is satisfied, it is legal that described server can be judged the access request of described network data.Default ground, described access control rule can also be set as the access consideration of described network data all users and can access or all cannot access.
For example, the keeper of server can arrange following access control rule table on described server:
Project | User ID | Application identities symbol | Network data address |
1 | U1 | A1 | share1:/path1/file1 |
2 | U2 | A2 | share1:/path2/file2 |
The implication of this access control rule table is: when the user that user ID is U1 logins, allow it by the application identities network data that to accord with as the application access address of A1 be " share1:/path1/file1 "; User ID is the user of U2 while logining, allows it by the application identities network data that to accord with as the application access address of A2 be " share1:/path2/file2 ".Described access control rule table can for example, be stored on server with the form (XML form) that meets server needs, to use in the time judging the legitimacy of access request.
In step 103, if judge that access request is legal, allows the access to described network data.
In the present embodiment, above-mentioned server is judged above-mentioned access request in step 102 be legal in the situation that, allows above-mentioned user by means of the application in above-mentioned client, network data to be conducted interviews.For access result, described server can, in the mode of RPC response, return to described client by network.
In an optional execution mode of the present embodiment, from client in step 10l, the access request of network data is also further comprised to the operation information to described network data, described operation information is used to indicate the concrete action type to described network data, for example read operation or write operation.At this moment, in step 102, carry out, according to the identification information of identity information and application, the legitimacy of access request is judged and can be further refined as following operation: according to the identification information of described identity information, described application and described operation information, the legitimacy of described access request is judged.
In the situation that access request has comprised operation information, for example, the keeper of server can as followsly arrange access control rule table on described server:
Project | User ID | Application identities symbol | Network data address | Allow action type |
1 | U1 | A1 | share1:/path1/file1 | Read-only |
2 | U2 | A2 | share1:/path2/file2 | Read or write |
The implication of above-mentioned access control rule table is: when the user that user ID is U1 logins, allow it to accord with the application into A1 by application identities, the network data taking the mode reference address of " reading " as " share1:/Dath1/file1 "; User ID is the user of U2 while logining, allows it to accord with the application into A2 by application identities, the network data taking the mode reference address of " reading " or " writing " as " share1:/path2/file2 ".Described access control rule table can for example, be stored on server with the form (XML form) that meets server needs, to use in the time judging the legitimacy of access request.
In another optional execution mode of the present embodiment, from client in step 101, the access request of network data is also further comprised to the address information (for example IP address or MAC Address) of described client.At this moment, in step 102, carry out, according to the identification information of identity information and application, the legitimacy of access request is judged and can be further refined as following operation: according to the address information of the identification information of described identity information, described application and described client, the legitimacy of described access request is judged.
The address information that has comprised client in access request, for example, the keeper of server can as followsly arrange access control rule table on described server:
Project | User ID | Application identities symbol | Network data address | Address |
1 | U1 | A1 | share1:/path1/file1 | 116.122.98.18 |
2 | U2 | A2 | share1:/path2/file2 | 114.112.18.18 |
The implication of above-mentioned access control rule table is: when the user that user ID is U1 logins for the main frame of " 116.122.98.18 " from address, allow it to accord with the application into A1 by application identities, reference address is the network data of " share1:/path1/file1 "; User ID is that the user of U2 during for the main frame login of " 114.112.18.18 ", allows it to accord with the application into A2 by application identities from address, and reference address is the network data of " share1:/path2/file2 ".Described access control rule table can for example, be stored on server with the form (XML form) that meets server needs, to use in the time judging the legitimacy of access request.
In another optional execution mode of the present embodiment, in step 101, can further include operation information to described network data and the address information (for example IP address or MAC Address) of described client from the access request to network data of client.At this moment, in step 102, carry out, according to the identification information of identity information and application, the legitimacy of access request is judged and can be further refined as following operation: according to the identification information of described identity information, described application, operation information to described network data and the address information of described client, the legitimacy of described access request is judged.
In another optional execution mode of the present embodiment, after step 103, can also comprise the following steps 104: if be illegal from the access request of client in determining step 101, carry out one or more in following operation: the access of refusal to the described network data being associated with described address information; Described network data is protected to operation, for example local at server or remotely described network data is backed up; Record the relevant information of described access request, for example the included information of described access request, receives the temporal information of described access request etc.
The method that above-described embodiment of the application provides is passed through the first access request to network data from client, then according to the identification information of the identity information extracting in described access request and application, the legitimacy of access request is judged, last again in the situation that to judge access request be legal and allow the access to described network data, realize the meticulousr control of the access to network data.
With further reference to Fig. 2, it shows the structural representation of an embodiment of the access control apparatus of network data.
As shown in Figure 2, the access control apparatus 200 of the network data described in the present embodiment comprises: receiver module 201, judge module 202 and authorization module 203.Described access control apparatus 200 can be arranged on the server of having stored network data, thereby or can with described server communicate realize associated.Wherein, receiver module 201 is for receiving the access request to described network data from client (not shown), wherein, described access request is sent by means of the application in described client by the user of described client, described access request comprises: described user's identity information, the identification information of described application and the address information of described network data; Judge module 202 is for judging the legitimacy of described access request according to the identification information of described identity information and described application; If authorization module 203 judges that for described judge module 202 described access request is legal, allow the access of the described network data to being associated with described address information.
In the present embodiment, the receiver module 201 of access control apparatus 200 can by wired connection mode or wireless connections mode from above-mentioned client the access request to network data.Described client to the access request of network data (is for example sent, RPC (the Remote ProcedureCall that network data is read, remote procedure call) request) afterwards, can wait for by synchronous or asynchronous mode the response of described access control apparatus 200.
Wherein, described access request is sent by means of the application in described client by the user of described client.For example, under (SuSE) Linux OS environment, described user can operate the application (such as file copy program) in described client, and the POSIX that described application provides by operating system (PortableOperating System Interface, POSIX) standard interface carries out read-write operation to the network data being stored on server.
In the present embodiment, above-mentioned receiver module 201 is from above-mentioned client to after the access request of network data, the judge module 202 of above-mentioned access control apparatus 200 can be resolved described access request, extracts the address information of the identification information of the user's of the application in the described client of wherein included operation identity information, described application and the network data of expectation access.
Afterwards, described judge module 202, according to described identity information and described identification information, based on predetermined access control rule, judges the legitimacy of the access request of the network data that described address information is navigated to.Described access control rule can be such rule, and it has defined the condition that can conduct interviews to described network data.For example, described access control rule has defined following two conditions: the first, and user's that can accesses network data identity (obtaining the identity information from user) condition; The second, mark (obtaining the identification information of the self-application) condition of the application that user that can accesses network data uses.In the situation that above two conditions are all satisfied, it is legal that described judge module 202 can be judged the access request of described network data.Certainly, also can be set as, the arbitrary condition in above two conditions is satisfied, it is legal that described judge module 202 can be judged the access request of described network data.Default ground, described access control rule can also be set as the access consideration of described network data all users and can access or all cannot access.
In the present embodiment, the authorization module 203 of above-mentioned access control apparatus 200 to judge above-mentioned access request be legal in the situation that, allows above-mentioned user by means of the application in above-mentioned client, network data to be conducted interviews at above-mentioned judge module 202.For access result, the server of having stored described network data can, in the mode of RPC response, return to described client by network.
In an optional execution mode of the present embodiment, described access request further comprises the operation information to described network data.Described judge module 202 can judge the legitimacy of above-mentioned access request according to the identification information of above-mentioned identity information, above-mentioned application and described operation information.
In an optional execution mode of the present embodiment; above-mentioned access control apparatus 200 also comprises protection module (not shown); if judge that for described judge module 202 described access request is illegal; described protection module is carried out one or more in following operation: the access of refusal to the described network data being associated with described address information; described network data is protected to operation, record the relevant information of described access request.
The module being described in the embodiment of the present application can realize by the mode of software, also can realize by the mode of hardware.Described module also can be arranged in processor, for example, can be described as: a kind of processor comprises receiver module judge module and authorization module.Wherein, the title of these modules does not form the restriction to this module itself under certain conditions, and for example, receiver module can also be described to " for the module of the access request to described network data from client ".
As on the other hand, the application also provides a kind of computer-readable recording medium, and this computer-readable recording medium can be the computer-readable recording medium comprising in the described device in above-described embodiment; Also can be individualism, be unkitted the computer-readable recording medium of allocating in client or server.Described computer-readable recording medium stores more than one or one program, and described program is used for carrying out the access control method of the network data that is described in the application by one or more than one processor.
The access control method of the network data that the application provides and device, the legitimacy of described access request is judged from the identification information of the identity information in the access request of client and application by basis, again in the situation that to judge access request be legal and allow the access to described network data, realize controlling more accurately of access to network data.
More than describing is only the application's preferred embodiment and the explanation to institute's application technology principle.Those skilled in the art are to be understood that, related invention scope in the application, be not limited to the technical scheme that the particular combinations of above-mentioned technical characterictic forms, also should be encompassed in the situation that does not depart from described inventive concept simultaneously, carry out combination in any and other technical scheme of forming by above-mentioned technical characterictic or its equivalent feature.The technical characterictic that for example, in above-mentioned feature and the application disclosed (but being not limited to) has a similar functions is replaced mutually and the technical scheme that forms.
Claims (10)
1. an access control method for network data, is characterized in that, comprising:
Access request from client to described network data, wherein, described access request is sent by means of the application in described client by the user of described client, described access request comprises: described user's identity information, the identification information of described application and the address information of described network data;
According to the identification information of described identity information and described application, the legitimacy of described access request is judged;
If judge that described access request is legal, allow the access of the described network data to being associated with described address information.
2. the access control method of network data according to claim 1, is characterized in that, described access request further comprises the operation information to described network data.
3. the access control method of network data according to claim 2, it is characterized in that, describedly according to the identification information of described identity information and described application, the legitimacy of described access request is judged, comprising: according to the identification information of described identity information, described application and described operation information, the legitimacy of described access request is judged.
4. the access control method of network data according to claim 1, is characterized in that, described access request further comprises the address information of described client.
5. the access control method of network data according to claim 4, it is characterized in that, describedly according to the identification information of described identity information and described application, the legitimacy of described access request is judged, comprising: according to the address information of the identification information of described identity information, described application and described client, the legitimacy of described access request is judged.
6. the access control method of network data according to claim 1; it is characterized in that; also comprise: if judge that described access request is illegal; carry out one or more in following operation: the access of refusal to the described network data being associated with described address information; described network data is protected to operation, record the relevant information of described access request.
7. an access control apparatus for network data, is characterized in that, comprising:
Receiver module, for the access request to described network data from client, wherein, described access request is sent by means of the application in described client by the user of described client, described access request comprises: described user's identity information, the identification information of described application and the address information of described network data;
Judge module, for judging the legitimacy of described access request according to the identification information of described identity information and described application;
Authorization module, if judge that for described judge module described access request is legal, allows the access of the described network data to being associated with described address information.
8. the access control apparatus of network data according to claim 7, is characterized in that, described access request further comprises the operation information to described network data.
9. the access control apparatus of network data according to claim 8, is characterized in that, described judge module comprises: according to the identification information of described identity information, described application and described operation information, the legitimacy of described access request is judged.
10. the access control apparatus of network data according to claim 7; it is characterized in that; also comprise: protection module; if judge that for described judge module described access request is illegal; carry out one or more in following operation: the access of refusal to the described network data being associated with described address information; described network data is protected to operation, record the relevant information of described access request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410231839.6A CN103973712A (en) | 2014-05-29 | 2014-05-29 | Access control method and device for network data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410231839.6A CN103973712A (en) | 2014-05-29 | 2014-05-29 | Access control method and device for network data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103973712A true CN103973712A (en) | 2014-08-06 |
Family
ID=51242758
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410231839.6A Pending CN103973712A (en) | 2014-05-29 | 2014-05-29 | Access control method and device for network data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103973712A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104486110A (en) * | 2014-12-09 | 2015-04-01 | 上海爱数软件有限公司 | Unified storage resource management method based on RPC (remote procedure call) protocols |
CN105049431A (en) * | 2015-06-30 | 2015-11-11 | 深圳市深信服电子科技有限公司 | Data access control method and device |
CN105391686A (en) * | 2015-10-15 | 2016-03-09 | 桂林电子科技大学 | Data access method and data access device |
CN107181624A (en) * | 2017-06-30 | 2017-09-19 | 联想(北京)有限公司 | A kind of method for connecting network, electronic equipment and computer-readable storage medium |
CN108322418A (en) * | 2017-01-16 | 2018-07-24 | 深圳兆日科技股份有限公司 | The detection method and device of unauthorized access |
CN110830419A (en) * | 2018-08-09 | 2020-02-21 | 华为技术有限公司 | Access control method and device for internet protocol camera |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702724A (en) * | 2009-11-02 | 2010-05-05 | 中国农业大学 | Safe control method and device of network access |
CN103716295A (en) * | 2012-09-28 | 2014-04-09 | 株式会社得那 | Network system and non-transitory computer-readable storage medium |
CN103747076A (en) * | 2013-12-31 | 2014-04-23 | 曙光云计算技术有限公司 | Cloud platform access method and device |
CN103795690A (en) * | 2012-10-31 | 2014-05-14 | 华为技术有限公司 | Cloud access control method, proxy server, and cloud access control system |
-
2014
- 2014-05-29 CN CN201410231839.6A patent/CN103973712A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702724A (en) * | 2009-11-02 | 2010-05-05 | 中国农业大学 | Safe control method and device of network access |
CN103716295A (en) * | 2012-09-28 | 2014-04-09 | 株式会社得那 | Network system and non-transitory computer-readable storage medium |
CN103795690A (en) * | 2012-10-31 | 2014-05-14 | 华为技术有限公司 | Cloud access control method, proxy server, and cloud access control system |
CN103747076A (en) * | 2013-12-31 | 2014-04-23 | 曙光云计算技术有限公司 | Cloud platform access method and device |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104486110A (en) * | 2014-12-09 | 2015-04-01 | 上海爱数软件有限公司 | Unified storage resource management method based on RPC (remote procedure call) protocols |
CN104486110B (en) * | 2014-12-09 | 2018-04-13 | 上海爱数信息技术股份有限公司 | A kind of unified storage resource management method based on RPC agreements |
CN105049431A (en) * | 2015-06-30 | 2015-11-11 | 深圳市深信服电子科技有限公司 | Data access control method and device |
CN105049431B (en) * | 2015-06-30 | 2019-02-15 | 深信服科技股份有限公司 | Data access control method and device |
CN105391686A (en) * | 2015-10-15 | 2016-03-09 | 桂林电子科技大学 | Data access method and data access device |
CN108322418A (en) * | 2017-01-16 | 2018-07-24 | 深圳兆日科技股份有限公司 | The detection method and device of unauthorized access |
CN107181624A (en) * | 2017-06-30 | 2017-09-19 | 联想(北京)有限公司 | A kind of method for connecting network, electronic equipment and computer-readable storage medium |
CN110830419A (en) * | 2018-08-09 | 2020-02-21 | 华为技术有限公司 | Access control method and device for internet protocol camera |
CN110830419B (en) * | 2018-08-09 | 2021-05-18 | 华为技术有限公司 | Access control method and device for internet protocol camera |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11658979B2 (en) | Systems and methods for efficient and secure temporary anonymous access to media content | |
US9876785B2 (en) | System and method for safe login, and apparatus therefor | |
EP3241129B1 (en) | User terminal, service providing apparatus, driving method of user terminal, driving method of service providing apparatus, and encryption indexing-based search system | |
KR101850677B1 (en) | Method and system for determining whether a terminal logging into a website is a mobile terminal | |
US20180013747A1 (en) | Controlling Access to Resources on a Network | |
CN103973712A (en) | Access control method and device for network data | |
US9258299B2 (en) | Biometric cloud communication and data movement | |
US10778680B2 (en) | Method and apparatus for accessing website | |
US20190089810A1 (en) | Resource access method, apparatus, and system | |
CN106796632B (en) | Remote access control to stored data | |
JP6514721B2 (en) | Dual channel identification and authentication | |
US9769654B2 (en) | Method of implementing a right over a content | |
US10397191B2 (en) | Passing content securely from web browsers to computer applications | |
CN105354451B (en) | Access authentication method and system | |
EP3146693B1 (en) | Bifurcated authentication token techniques | |
US8887290B1 (en) | Method and system for content protection for a browser based content viewer | |
EP3652915A1 (en) | User-directed identity verification over a network | |
US11777724B2 (en) | Data fragmentation and reconstruction | |
CN113038192B (en) | Video processing method and device, electronic equipment and storage medium | |
CN104951714A (en) | Constellation based on device binding | |
CN104679824A (en) | Webpage generating method and webpage generating system of network platform | |
CN103095825B (en) | A kind of approaches to IM of the Internet and system, server | |
US20200177664A1 (en) | Systems and methods for accessing multiple resources via one identifier | |
CN104717187A (en) | Login method and device | |
US8826373B2 (en) | Methods and systems for sharing digital assets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140806 |
|
WD01 | Invention patent application deemed withdrawn after publication |