CN110427753A - Processing method and processing device for robot task encryption - Google Patents

Processing method and processing device for robot task encryption Download PDF

Info

Publication number
CN110427753A
CN110427753A CN201910670702.3A CN201910670702A CN110427753A CN 110427753 A CN110427753 A CN 110427753A CN 201910670702 A CN201910670702 A CN 201910670702A CN 110427753 A CN110427753 A CN 110427753A
Authority
CN
China
Prior art keywords
current task
robot
interference incident
task process
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910670702.3A
Other languages
Chinese (zh)
Inventor
支涛
谭瑞昀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yunji Technology Co Ltd
Original Assignee
Beijing Yunji Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yunji Technology Co Ltd filed Critical Beijing Yunji Technology Co Ltd
Publication of CN110427753A publication Critical patent/CN110427753A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Numerical Control (AREA)

Abstract

This application discloses a kind of processing method and processing devices for robot task encryption.This method comprises: the current task process of robot is obtained, wherein the current task process refers to the preset task process that robot executes;Whether have interference incident, wherein described have interference incident to refer to that interference robot completes the trigger event of the preset task process executed if monitoring in the current task process;If there is interference incident, then preset cryptographic verifying operation is executed;According to the encrypted authentication as a result, judging whether to interrupt or terminate current task.Disturbed technical problem is easy when the application robot task executes.And the task that robot is carrying out is encrypted according to the encrypted authentication as a result, judge whether to interrupt or terminate current task by the application.

Description

Processing method and processing device for robot task encryption
Technical field
This application involves robot field, in particular to a kind of processing method for robot task encryption and Device.
Background technique
Robot can realize to include: food delivery, the tasks such as explanation, guide, cruises.
It is easy to be interfered by non-user when inventors have found that robot is from the task of execution, to influence normal task Process.
It is easy disturbed problem when executing for robot task in the related technology, not yet proposes effective solution at present Scheme.
Summary of the invention
The main purpose of the application is to provide a kind of processing method and processing device for robot task encryption, to solve Disturbed problem is easy when robot task executes.
To achieve the goals above, it according to the one aspect of the application, provides a kind of for robot task encryption Processing method.
According to the application for the processing method of robot task encryption include: obtain the current task of robot into Journey, wherein the current task process refers to the preset task process that robot executes;
Whether have interference incident, wherein described have interference incident to refer to jammer if monitoring in the current task process Device people completes the trigger event of the preset task process executed;
If there is interference incident, then preset cryptographic verifying operation is executed;
According to the encrypted authentication as a result, judging whether to interrupt or terminate current task.
Further, if according to the encrypted authentication as a result, judging whether that it includes: described for interrupting or terminate current task Encrypted authentication result verification when passing through the current task process terminated, then terminate current task;If the encrypted authentication The current task process is not finished when result verification passes through, then interrupts current task process;If the encrypted authentication result It is not verified, then do not interrupt or terminate current task.
Further, whether monitor has interference incident in the current task process include: that monitoring is described as predecessor Whether first interference incident is had in business process, wherein first interference incident includes at least: dry outside a robot Disturb event;If there is interference incident, then executing preset cryptographic verifying operation includes: then to respond if there is the first interference incident Preset cryptographic verifying operation is executed before first interference incident.
Further, whether monitor has interference incident in the current task process include: that monitoring is described as predecessor Whether second interference incident is had in business process, wherein the interference incident includes at least: a robot interior interference Event;If there is interference incident, then executing preset cryptographic verifying operation includes: if there is the second interference incident, then in response institute Preset cryptographic verifying operation is executed after stating the second interference incident.
Further, the current task process for obtaining robot includes: to obtain the multiple tasks of robot configuration;Determine machine At least one task that device people is currently executing;According at least one described task, current task process is obtained.
To achieve the goals above, it according to the another aspect of the application, provides a kind of for robot task encryption Processing unit.
It include: acquisition module according to the processing unit for robot task encryption of the application, for obtaining robot Current task process;Module is monitored, for monitoring in the current task process whether have interference incident;Execute mould Block, for when occurring if there is interference incident, then executing preset cryptographic verifying operation;Judgment module, for being added according to described Close verification result judges whether to interrupt or terminate current task.
Further, if the judgment module includes: the current task when encrypted authentication result verification passes through Process has terminated, then terminates current task;If the encrypted authentication result verification when passing through the current task process do not tie Beam then interrupts current task process;If the encrypted authentication result is not verified, current task is not interrupted or terminated.
Further, the monitoring module includes: and monitors whether to have the first interference incident hair in the current task process It is raw, wherein first interference incident includes at least: a robot external disturbance event;If the execution module includes: There is the first interference incident, then executes preset cryptographic verifying operation before responding first interference incident.
Further, the monitoring module includes: and monitors whether to have the second interference incident hair in the current task process It is raw, wherein the interference incident includes at least: a robot interior interference incident;The execution module include: if there is Second interference incident then executes preset cryptographic verifying operation after responding second interference incident.
Further, the module that obtains includes: to obtain the multiple tasks of robot configuration;Determine robot currently At least one task executed;According at least one described task, current task process is obtained.
Processing method and processing device for robot task encryption in the embodiment of the present application, using working as acquisition robot The mode of preceding task process has been reached by monitoring in the current task process whether have interference incident if there is dry Event is disturbed, then executes the purpose of preset cryptographic verifying operation, to realize according to the encrypted authentication in as a result, judging whether Technical effect that is disconnected or terminating current task, and then solve easy disturbed technical problem when robot task execution.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present application, so that the application's is other Feature, objects and advantages become more apparent upon.The illustrative examples attached drawing and its explanation of the application is for explaining the application, not Constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the processing method flow diagram for robot task encryption according to the application first embodiment;
Fig. 2 is the processing method flow diagram for robot task encryption according to the application second embodiment;
Fig. 3 is the processing method flow diagram for robot task encryption according to the application 3rd embodiment;
Fig. 4 is the processing method flow diagram for robot task encryption according to the application fourth embodiment;
Fig. 5 is the processing method flow diagram for robot task encryption according to the 5th embodiment of the application;
Fig. 6 is the processing method flow diagram for robot task encryption according to the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
In this application, term " on ", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outside", " in ", "vertical", "horizontal", " transverse direction ", the orientation or positional relationship of the instructions such as " longitudinal direction " be orientation based on the figure or Positional relationship.These terms are not intended to limit indicated dress primarily to better describe the application and embodiment Set, element or component must have particular orientation, or constructed and operated with particular orientation.
Also, above-mentioned part term is other than it can be used to indicate that orientation or positional relationship, it is also possible to for indicating it His meaning, such as term " on " also are likely used for indicating certain relations of dependence or connection relationship in some cases.For ability For the those of ordinary skill of domain, the concrete meaning of these terms in this application can be understood as the case may be.
In addition, term " installation ", " setting ", " being equipped with ", " connection ", " connected ", " socket " shall be understood in a broad sense.For example, It may be a fixed connection, be detachably connected or monolithic construction;It can be mechanical connection, or electrical connection;It can be direct phase It even, or indirectly connected through an intermediary, or is two connections internal between device, element or component. For those of ordinary skills, the concrete meaning of above-mentioned term in this application can be understood as the case may be.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
As shown in Figure 1, this method includes the following steps, namely S102 to step S110:
Step S102 obtains the current task process of robot;
The execution state for obtaining the current task of the robot can be judged by current task process.The application is implemented Current task process in example refers to that the robot is carrying out the performance level of current task.
The current task process is depending on the performance of task the application.
Whether step S104, monitoring in the current task process has interference incident;
Whether have interference incident can be, if having extraneous interference incident if monitoring in the current task process. For example, the extraneous session request access having other than non-user.For another example, the extraneous request of exiting having other than non-user accesses.Again For example, the extraneous manual intervention having other than multiple non-user.
Whether have interference incident be also possible to, if dry inside organic device people if monitoring in the current task process Disturb event.For example, event is exited in inside.For another example, internal frequent data item request.
Step S106 then executes preset cryptographic verifying operation if there is interference incident;
Occurred by judging whether there is the interference incident, if there is there are interference incidents, then can be executed in robot Preset cryptographic verifying operation can verify whether current interference incident is that non-user is disliked by the preset cryptographic verifying operation Meaning operation or the maloperation of user.
The preset cryptographic verifying operation can be Crypted password verification operation, crypto identity verification operation, encrypted ones Verification operation etc..
It should be noted that specific cryptographic verifying operation is not defined in embodiments herein, as long as It is able to verify that requirement.
Step S108, according to the encrypted authentication as a result, judging whether to interrupt or terminate current task.
According to the encrypted authentication as a result, robot can decide whether to need to interrupt current task or terminate as predecessor Business.
It interrupts current task to refer to, there is no completions for the current task process of the robot, so if it is normal Request is exited, then task of terminal being needed to be currently executing.
Stop current task and refers to that the current task process of the robot has been completed but do not exited also, so if It is normally to exit request, then needs terminal when stopping current task.
It can be seen from the above description that the application realizes following technical effect:
Processing method for robot task encryption in the embodiment of the present application, using the current task for obtaining robot The mode of process has been reached if there is interference incident by monitoring in the current task process whether have interference incident, The purpose of preset cryptographic verifying operation is then executed, to realize according to the encrypted authentication as a result, judging whether to interrupt or tie The technical effect of beam current task, and then solve easy disturbed technical problem when robot task execution.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in Fig. 2, according to the encrypted authentication as a result, Judge whether that interrupting or terminate current task includes:
Step S202, if the encrypted authentication result verification when passing through the current task process terminated, terminate Current task;
Step S204, if the encrypted authentication result verification when passing through the current task process be not finished, interrupt Current task process;
Step S206 does not interrupt or terminates current task if the encrypted authentication result is not verified.
Specifically, if the encrypted authentication result verification when passing through the current task process terminated, the machine Device people directly terminates current task.If the encrypted authentication result verification when passing through the current task process be not finished, The robot can interrupt current task process, and restore current task process again hereafter.If the encrypted authentication knot Fruit is not verified, then does not interrupt or terminate current task, and robot is judged as the interference or malicious interference of non-user.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 3, monitoring the current task process In whether there is the interference incident to include:
Whether step S302, monitoring in the current task process has the first interference incident, wherein described first is dry The event of disturbing includes at least: a robot external disturbance event;
If there is interference incident, then executing preset cryptographic verifying operation includes:
Step S304 then executes preset encryption before responding first interference incident and tests if there is the first interference incident Card operation.
Specifically, by monitoring in the current task process whether have the first interference incident, judge to the machine The external disturbance event of device people, and then executed in advance before responding the external disturbance event according to the external disturbance event Set cryptographic verifying operation.For example, robot external disturbance event can be, the robot is carrying out explanation task, at this time There is external session request.Or the robot is carrying out cruise task, has applied external force to hinder robot at this time.Work as institute When stating the generation of robot external disturbance event, need to execute preset encrypted authentication before responding the robot external disturbance event Operation.For example, input password authentification.
Be also when it should be noted that whether having the generation of the first interference incident by monitoring in the current task process by Caused by abnormal operation.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 4, monitoring the current task process In whether there is the interference incident to include:
Whether step S402, monitoring in the current task process has the second interference incident, wherein the interference Event includes at least: a robot interior interference incident;
If there is interference incident, then executing preset cryptographic verifying operation includes:
Step S404 then executes preset encryption after responding second interference incident and tests if there is the second interference incident Card operation.
Specifically, by monitoring in the current task process whether have the second interference incident, judge to the machine The external disturbance event of device people, and then executed in advance before responding the internal interference event according to the internal interference event Set cryptographic verifying operation.For example, robot interior interference incident can be, the robot is carrying out explanation task, at this time There is internal update request of data.Or the robot is carrying out cruise task, there is charge inside request at this time.When the machine When device people's internal interference event occurs, need to execute preset encrypted authentication behaviour before responding the robot external disturbance event Make.For example, input password authentification.
Be also when it should be noted that whether having the generation of the second interference incident by monitoring in the current task process by Caused by abnormal operation.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 5, obtaining the current task of robot Process includes:
Step S502 obtains the multiple tasks of robot configuration;
Step S504 determines at least one task that robot is currently executing;
Step S506 obtains current task process according at least one described task.
Specifically, by obtaining the preconfigured multiple tasks of robot, it can determine that the robot works as Before at least one described task for being carrying out obtain presently described robot by least one described task and be carrying out At least one task process.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not The sequence being same as herein executes shown or described step.
According to the embodiment of the present application, additionally provide a kind of for implementing the dress of the above-mentioned processing for robot task encryption It sets, as shown in fig. 6, the device includes:
Module 10 is obtained, for obtaining the current task process of robot;
The execution state for obtaining the current task of the robot can be judged by current task process.The application is implemented Current task process in example refers to that the robot is carrying out the performance level of current task.
The current task process is depending on the performance of task the application.
Module 20 is monitored, for monitoring in the current task process whether have interference incident;
Whether have interference incident can be, if having extraneous interference incident if monitoring in the current task process. For example, the extraneous session request access having other than non-user.For another example, the extraneous request of exiting having other than non-user accesses.Again For example, the extraneous manual intervention having other than multiple non-user.
Whether have interference incident be also possible to, if dry inside organic device people if monitoring in the current task process Disturb event.For example, event is exited in inside.For another example, internal frequent data item request.
Execution module 30, for when occurring if there is interference incident, then executing preset cryptographic verifying operation;
Occurred by judging whether there is the interference incident, if there is there are interference incidents, then can be executed in robot Preset cryptographic verifying operation can verify whether current interference incident is that non-user is disliked by the preset cryptographic verifying operation Meaning operation or the maloperation of user.
The preset cryptographic verifying operation can be Crypted password verification operation, crypto identity verification operation, encrypted ones Verification operation etc..
It should be noted that specific cryptographic verifying operation is not defined in embodiments herein, as long as It is able to verify that requirement.
Judgment module 40, for according to the encrypted authentication as a result, judge whether interrupt or terminate current task.
According to the encrypted authentication as a result, robot can decide whether to need to interrupt current task or terminate as predecessor Business.
It interrupts current task to refer to, there is no completions for the current task process of the robot, so if it is normal Request is exited, then task of terminal being needed to be currently executing.
Stop current task and refers to that the current task process of the robot has been completed but do not exited also, so if It is normally to exit request, then needs terminal when stopping current task.
It can be seen from the above description that the application realizes following technical effect:
Processing unit for robot task encryption in the embodiment of the present application, using the current task for obtaining robot The mode of process has been reached if there is interference incident by monitoring in the current task process whether have interference incident, The purpose of preset cryptographic verifying operation is then executed, to realize according to the encrypted authentication as a result, judging whether to interrupt or tie The technical effect of beam current task, and then solve easy disturbed technical problem when robot task execution.
According to the embodiment of the present application, as preferred in the present embodiment, if the judgment module 400 is used for the encryption The current task process has terminated when verification result is verified, then terminates current task;If the encrypted authentication result The current task process is not finished when being verified, then interrupts current task process;If the encrypted authentication result is not tested Card passes through, then does not interrupt or terminate current task.
Specifically, if the encrypted authentication result verification when passing through the current task process terminated, the machine Device people directly terminates current task.If the encrypted authentication result verification when passing through the current task process be not finished, The robot can interrupt current task process, and restore current task process again hereafter.If the encrypted authentication knot Fruit is not verified, then does not interrupt or terminate current task, and robot is judged as the interference or malicious interference of non-user.
According to the embodiment of the present application, as preferred in the present embodiment, the monitoring module 200 include: monitor described in work as Whether first interference incident is had in preceding task process, wherein first interference incident includes at least: outside a robot Portion's interference incident;The execution module includes: then to execute before responding first interference incident if there is the first interference incident Preset cryptographic verifying operation.
Specifically, by monitoring in the current task process whether have the first interference incident, judge to the machine The external disturbance event of device people, and then executed in advance before responding the external disturbance event according to the external disturbance event Set cryptographic verifying operation.For example, robot external disturbance event can be, the robot is carrying out explanation task, at this time There is external session request.Or the robot is carrying out cruise task, has applied external force to hinder robot at this time.Work as institute When stating the generation of robot external disturbance event, need to execute preset encrypted authentication before responding the robot external disturbance event Operation.For example, input password authentification.
Be also when it should be noted that whether having the generation of the first interference incident by monitoring in the current task process by Caused by abnormal operation.
According to the embodiment of the present application, as preferred in the present embodiment, the monitoring module 200 is used for, and is worked as described in monitoring Whether second interference incident is had in preceding task process, wherein the interference incident includes at least: a robot interior Interference incident;The execution module is used for, and if there is the second interference incident, is then executed after responding second interference incident pre- Set cryptographic verifying operation.
Specifically, by monitoring in the current task process whether have the second interference incident, judge to the machine The external disturbance event of device people, and then executed in advance before responding the internal interference event according to the internal interference event Set cryptographic verifying operation.For example, robot interior interference incident can be, the robot is carrying out explanation task, at this time There is internal update request of data.Or the robot is carrying out cruise task, there is charge inside request at this time.When the machine When device people's internal interference event occurs, need to execute preset encrypted authentication behaviour before responding the robot external disturbance event Make.For example, input password authentification.
Be also when it should be noted that whether having the generation of the second interference incident by monitoring in the current task process by Caused by abnormal operation.
According to the embodiment of the present application, as preferred in the present embodiment, the acquisition module 100 is matched for obtaining robot The multiple tasks set;Determine at least one task that robot is currently executing;According at least one described task, acquisition is worked as Preceding task process.
Specifically, by obtaining the preconfigured multiple tasks of robot, it can determine that the robot works as Before at least one described task for being carrying out obtain presently described robot by least one described task and be carrying out At least one task process.
Obviously, those skilled in the art should be understood that each module of above-mentioned the application or each step can be with general Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored Be performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by they In multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the application be not limited to it is any specific Hardware and software combines.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.

Claims (10)

1. a kind of processing method for robot task encryption characterized by comprising
Obtain robot current task process, wherein the current task process refer to robot execute preset task into Journey;
Whether have interference incident, wherein described have interference incident to refer to interference robot if monitoring in the current task process Complete the trigger event of the preset task process executed;
If there is interference incident, then preset cryptographic verifying operation is executed;
According to the encrypted authentication as a result, judging whether to interrupt or terminate current task.
2. processing method according to claim 1, which is characterized in that according to the encrypted authentication as a result, judging whether in Breaking or terminate current task includes:
If the encrypted authentication result verification when passing through the current task process terminated, terminate current task;
If the encrypted authentication result verification when passing through the current task process be not finished, interrupt current task process;
If the encrypted authentication result is not verified, current task is not interrupted or terminated.
3. processing method according to claim 1, which is characterized in that
Whether monitor has the interference incident to include: in the current task process
Whether have first interference incident, wherein first interference incident at least wraps if monitoring in the current task process It includes: a robot external disturbance event;
If there is interference incident, then executing preset cryptographic verifying operation includes:
If there is the first interference incident, then preset cryptographic verifying operation is executed before responding first interference incident.
4. processing method according to claim 1, which is characterized in that
Whether monitor has the interference incident to include: in the current task process
Whether have second interference incident, wherein the interference incident includes at least if monitoring in the current task process: One robot interior interference incident;
If there is interference incident, then executing preset cryptographic verifying operation includes:
If there is the second interference incident, then preset cryptographic verifying operation is executed after responding second interference incident.
5. processing method according to claim 1, which is characterized in that the current task process for obtaining robot includes:
Obtain the multiple tasks of robot configuration;
Determine at least one task that robot is currently executing;
According at least one described task, current task process is obtained.
6. a kind of processing unit for robot task encryption characterized by comprising
Module is obtained, for obtaining the current task process of robot;
Module is monitored, for monitoring in the current task process whether have interference incident;
Execution module, for when occurring if there is interference incident, then executing preset cryptographic verifying operation;
Judgment module, for according to the encrypted authentication as a result, judge whether interrupt or terminate current task.
7. processing unit according to claim 1, which is characterized in that the judgment module is used for,
When the encrypted authentication result verification passes through the current task process at the end of, then terminate current task;
When the current task process is not finished when the encrypted authentication result verification passes through, then current task process is interrupted;
When the encrypted authentication result is not verified, then current task is not interrupted or terminates.
8. processing unit according to claim 1, which is characterized in that the monitoring module is used for,
Whether have first interference incident, wherein first interference incident at least wraps if monitoring in the current task process It includes: a robot external disturbance event;
The execution module is used for,
When if there is the first interference incident, then preset cryptographic verifying operation is executed before responding first interference incident.
9. processing unit according to claim 1, which is characterized in that
The monitoring module is used for,
Whether have second interference incident, wherein the interference incident includes at least if monitoring in the current task process: One robot interior interference incident;
The execution module is used for,
When if there is the second interference incident, then preset cryptographic verifying operation is executed after responding second interference incident.
10. processing unit according to claim 1, which is characterized in that the acquisition module is used for,
Obtain the multiple tasks of robot configuration;
Determine at least one task that robot is currently executing;
According at least one described task, current task process is obtained.
CN201910670702.3A 2019-04-30 2019-07-23 Processing method and processing device for robot task encryption Pending CN110427753A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2019103643320 2019-04-30
CN201910364332 2019-04-30

Publications (1)

Publication Number Publication Date
CN110427753A true CN110427753A (en) 2019-11-08

Family

ID=68410588

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910670702.3A Pending CN110427753A (en) 2019-04-30 2019-07-23 Processing method and processing device for robot task encryption

Country Status (1)

Country Link
CN (1) CN110427753A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425193A (en) * 2008-11-14 2009-05-06 林江峰 Household intelligent terminal for confirming authority using identity by finger print
CN104154925A (en) * 2014-08-25 2014-11-19 正量电子科技(苏州)有限公司 Guidance navigation method based on radio frequency identification
CN105956484A (en) * 2016-04-22 2016-09-21 广东小天才科技有限公司 Safe interaction method and system of intelligent terminal
CN106250730A (en) * 2016-07-19 2016-12-21 福州瑞芯微电子股份有限公司 A kind of intelligent watch unlocking method and a device
CN108563941A (en) * 2018-07-02 2018-09-21 信利光电股份有限公司 A kind of intelligent home equipment control method, intelligent sound box and intelligent domestic system
CN108737360A (en) * 2017-09-29 2018-11-02 北京猎户星空科技有限公司 Control method, device, robot device and the storage medium of robot
CN109343821A (en) * 2018-10-25 2019-02-15 珠海格力电器股份有限公司 Sound playing method, device, storage medium and electronic device
US20190058586A1 (en) * 2017-08-18 2019-02-21 Samsung Electronics Co., Ltd. METHOD AND AN APPARATUS FOR ONBOARDING IN AN IoT NETWORK

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425193A (en) * 2008-11-14 2009-05-06 林江峰 Household intelligent terminal for confirming authority using identity by finger print
CN104154925A (en) * 2014-08-25 2014-11-19 正量电子科技(苏州)有限公司 Guidance navigation method based on radio frequency identification
CN105956484A (en) * 2016-04-22 2016-09-21 广东小天才科技有限公司 Safe interaction method and system of intelligent terminal
CN106250730A (en) * 2016-07-19 2016-12-21 福州瑞芯微电子股份有限公司 A kind of intelligent watch unlocking method and a device
US20190058586A1 (en) * 2017-08-18 2019-02-21 Samsung Electronics Co., Ltd. METHOD AND AN APPARATUS FOR ONBOARDING IN AN IoT NETWORK
CN108737360A (en) * 2017-09-29 2018-11-02 北京猎户星空科技有限公司 Control method, device, robot device and the storage medium of robot
CN108563941A (en) * 2018-07-02 2018-09-21 信利光电股份有限公司 A kind of intelligent home equipment control method, intelligent sound box and intelligent domestic system
CN109343821A (en) * 2018-10-25 2019-02-15 珠海格力电器股份有限公司 Sound playing method, device, storage medium and electronic device

Similar Documents

Publication Publication Date Title
CN106156619B (en) Application security protection method and device
CN102624677B (en) Method and server for monitoring network user behavior
CN109766700A (en) Access control method and device, the storage medium, electronic device of file
CN104361285B (en) The safety detection method and device of mobile device application program
CN104767713B (en) Account binding method, server and system
KR100966073B1 (en) Apparatus and method for managing terminal users
CN103168458A (en) Method for managing keys in a manipulation-proof manner
TW201810109A (en) Processing method for preventing copy attack, server and client
CN110046514B (en) Debug data protection method, device, server and storage medium
CN106789986A (en) Monitoring device authentication method and device
CN106254329A (en) For the method protecting computer network security
CN108847930A (en) A kind of data transmission method, device and fire-fighting system
CN106209847A (en) Electric data transmission method and device
CN104318156A (en) Progress access safety method and system
CN114528602B (en) Security chip operation method and device based on attack detection behavior
CN105592459B (en) Safety certification device based on wireless communication
CN103200562A (en) Communication terminal locking method and communication terminal
CN106209844A (en) The electric power safety means of communication
CN106684985B (en) Wireless charging control method and wireless charging device
CN106569918A (en) Data backup method and mobile terminal
CN110099041A (en) A kind of Internet of Things means of defence and equipment, system
CN112312400B (en) Access control method, access controller and storage medium
CN110427753A (en) Processing method and processing device for robot task encryption
US10788809B2 (en) Method for the enabling of machine functions on a spinning-mill machine
CN106034132A (en) Protection Method and Computer System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191108

RJ01 Rejection of invention patent application after publication