CN110427753A - Processing method and processing device for robot task encryption - Google Patents
Processing method and processing device for robot task encryption Download PDFInfo
- Publication number
- CN110427753A CN110427753A CN201910670702.3A CN201910670702A CN110427753A CN 110427753 A CN110427753 A CN 110427753A CN 201910670702 A CN201910670702 A CN 201910670702A CN 110427753 A CN110427753 A CN 110427753A
- Authority
- CN
- China
- Prior art keywords
- current task
- robot
- interference incident
- task process
- interference
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Numerical Control (AREA)
Abstract
This application discloses a kind of processing method and processing devices for robot task encryption.This method comprises: the current task process of robot is obtained, wherein the current task process refers to the preset task process that robot executes;Whether have interference incident, wherein described have interference incident to refer to that interference robot completes the trigger event of the preset task process executed if monitoring in the current task process;If there is interference incident, then preset cryptographic verifying operation is executed;According to the encrypted authentication as a result, judging whether to interrupt or terminate current task.Disturbed technical problem is easy when the application robot task executes.And the task that robot is carrying out is encrypted according to the encrypted authentication as a result, judge whether to interrupt or terminate current task by the application.
Description
Technical field
This application involves robot field, in particular to a kind of processing method for robot task encryption and
Device.
Background technique
Robot can realize to include: food delivery, the tasks such as explanation, guide, cruises.
It is easy to be interfered by non-user when inventors have found that robot is from the task of execution, to influence normal task
Process.
It is easy disturbed problem when executing for robot task in the related technology, not yet proposes effective solution at present
Scheme.
Summary of the invention
The main purpose of the application is to provide a kind of processing method and processing device for robot task encryption, to solve
Disturbed problem is easy when robot task executes.
To achieve the goals above, it according to the one aspect of the application, provides a kind of for robot task encryption
Processing method.
According to the application for the processing method of robot task encryption include: obtain the current task of robot into
Journey, wherein the current task process refers to the preset task process that robot executes;
Whether have interference incident, wherein described have interference incident to refer to jammer if monitoring in the current task process
Device people completes the trigger event of the preset task process executed;
If there is interference incident, then preset cryptographic verifying operation is executed;
According to the encrypted authentication as a result, judging whether to interrupt or terminate current task.
Further, if according to the encrypted authentication as a result, judging whether that it includes: described for interrupting or terminate current task
Encrypted authentication result verification when passing through the current task process terminated, then terminate current task;If the encrypted authentication
The current task process is not finished when result verification passes through, then interrupts current task process;If the encrypted authentication result
It is not verified, then do not interrupt or terminate current task.
Further, whether monitor has interference incident in the current task process include: that monitoring is described as predecessor
Whether first interference incident is had in business process, wherein first interference incident includes at least: dry outside a robot
Disturb event;If there is interference incident, then executing preset cryptographic verifying operation includes: then to respond if there is the first interference incident
Preset cryptographic verifying operation is executed before first interference incident.
Further, whether monitor has interference incident in the current task process include: that monitoring is described as predecessor
Whether second interference incident is had in business process, wherein the interference incident includes at least: a robot interior interference
Event;If there is interference incident, then executing preset cryptographic verifying operation includes: if there is the second interference incident, then in response institute
Preset cryptographic verifying operation is executed after stating the second interference incident.
Further, the current task process for obtaining robot includes: to obtain the multiple tasks of robot configuration;Determine machine
At least one task that device people is currently executing;According at least one described task, current task process is obtained.
To achieve the goals above, it according to the another aspect of the application, provides a kind of for robot task encryption
Processing unit.
It include: acquisition module according to the processing unit for robot task encryption of the application, for obtaining robot
Current task process;Module is monitored, for monitoring in the current task process whether have interference incident;Execute mould
Block, for when occurring if there is interference incident, then executing preset cryptographic verifying operation;Judgment module, for being added according to described
Close verification result judges whether to interrupt or terminate current task.
Further, if the judgment module includes: the current task when encrypted authentication result verification passes through
Process has terminated, then terminates current task;If the encrypted authentication result verification when passing through the current task process do not tie
Beam then interrupts current task process;If the encrypted authentication result is not verified, current task is not interrupted or terminated.
Further, the monitoring module includes: and monitors whether to have the first interference incident hair in the current task process
It is raw, wherein first interference incident includes at least: a robot external disturbance event;If the execution module includes:
There is the first interference incident, then executes preset cryptographic verifying operation before responding first interference incident.
Further, the monitoring module includes: and monitors whether to have the second interference incident hair in the current task process
It is raw, wherein the interference incident includes at least: a robot interior interference incident;The execution module include: if there is
Second interference incident then executes preset cryptographic verifying operation after responding second interference incident.
Further, the module that obtains includes: to obtain the multiple tasks of robot configuration;Determine robot currently
At least one task executed;According at least one described task, current task process is obtained.
Processing method and processing device for robot task encryption in the embodiment of the present application, using working as acquisition robot
The mode of preceding task process has been reached by monitoring in the current task process whether have interference incident if there is dry
Event is disturbed, then executes the purpose of preset cryptographic verifying operation, to realize according to the encrypted authentication in as a result, judging whether
Technical effect that is disconnected or terminating current task, and then solve easy disturbed technical problem when robot task execution.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present application, so that the application's is other
Feature, objects and advantages become more apparent upon.The illustrative examples attached drawing and its explanation of the application is for explaining the application, not
Constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the processing method flow diagram for robot task encryption according to the application first embodiment;
Fig. 2 is the processing method flow diagram for robot task encryption according to the application second embodiment;
Fig. 3 is the processing method flow diagram for robot task encryption according to the application 3rd embodiment;
Fig. 4 is the processing method flow diagram for robot task encryption according to the application fourth embodiment;
Fig. 5 is the processing method flow diagram for robot task encryption according to the 5th embodiment of the application;
Fig. 6 is the processing method flow diagram for robot task encryption according to the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " tool
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units
Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear
Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
In this application, term " on ", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outside",
" in ", "vertical", "horizontal", " transverse direction ", the orientation or positional relationship of the instructions such as " longitudinal direction " be orientation based on the figure or
Positional relationship.These terms are not intended to limit indicated dress primarily to better describe the application and embodiment
Set, element or component must have particular orientation, or constructed and operated with particular orientation.
Also, above-mentioned part term is other than it can be used to indicate that orientation or positional relationship, it is also possible to for indicating it
His meaning, such as term " on " also are likely used for indicating certain relations of dependence or connection relationship in some cases.For ability
For the those of ordinary skill of domain, the concrete meaning of these terms in this application can be understood as the case may be.
In addition, term " installation ", " setting ", " being equipped with ", " connection ", " connected ", " socket " shall be understood in a broad sense.For example,
It may be a fixed connection, be detachably connected or monolithic construction;It can be mechanical connection, or electrical connection;It can be direct phase
It even, or indirectly connected through an intermediary, or is two connections internal between device, element or component.
For those of ordinary skills, the concrete meaning of above-mentioned term in this application can be understood as the case may be.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
As shown in Figure 1, this method includes the following steps, namely S102 to step S110:
Step S102 obtains the current task process of robot;
The execution state for obtaining the current task of the robot can be judged by current task process.The application is implemented
Current task process in example refers to that the robot is carrying out the performance level of current task.
The current task process is depending on the performance of task the application.
Whether step S104, monitoring in the current task process has interference incident;
Whether have interference incident can be, if having extraneous interference incident if monitoring in the current task process.
For example, the extraneous session request access having other than non-user.For another example, the extraneous request of exiting having other than non-user accesses.Again
For example, the extraneous manual intervention having other than multiple non-user.
Whether have interference incident be also possible to, if dry inside organic device people if monitoring in the current task process
Disturb event.For example, event is exited in inside.For another example, internal frequent data item request.
Step S106 then executes preset cryptographic verifying operation if there is interference incident;
Occurred by judging whether there is the interference incident, if there is there are interference incidents, then can be executed in robot
Preset cryptographic verifying operation can verify whether current interference incident is that non-user is disliked by the preset cryptographic verifying operation
Meaning operation or the maloperation of user.
The preset cryptographic verifying operation can be Crypted password verification operation, crypto identity verification operation, encrypted ones
Verification operation etc..
It should be noted that specific cryptographic verifying operation is not defined in embodiments herein, as long as
It is able to verify that requirement.
Step S108, according to the encrypted authentication as a result, judging whether to interrupt or terminate current task.
According to the encrypted authentication as a result, robot can decide whether to need to interrupt current task or terminate as predecessor
Business.
It interrupts current task to refer to, there is no completions for the current task process of the robot, so if it is normal
Request is exited, then task of terminal being needed to be currently executing.
Stop current task and refers to that the current task process of the robot has been completed but do not exited also, so if
It is normally to exit request, then needs terminal when stopping current task.
It can be seen from the above description that the application realizes following technical effect:
Processing method for robot task encryption in the embodiment of the present application, using the current task for obtaining robot
The mode of process has been reached if there is interference incident by monitoring in the current task process whether have interference incident,
The purpose of preset cryptographic verifying operation is then executed, to realize according to the encrypted authentication as a result, judging whether to interrupt or tie
The technical effect of beam current task, and then solve easy disturbed technical problem when robot task execution.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in Fig. 2, according to the encrypted authentication as a result,
Judge whether that interrupting or terminate current task includes:
Step S202, if the encrypted authentication result verification when passing through the current task process terminated, terminate
Current task;
Step S204, if the encrypted authentication result verification when passing through the current task process be not finished, interrupt
Current task process;
Step S206 does not interrupt or terminates current task if the encrypted authentication result is not verified.
Specifically, if the encrypted authentication result verification when passing through the current task process terminated, the machine
Device people directly terminates current task.If the encrypted authentication result verification when passing through the current task process be not finished,
The robot can interrupt current task process, and restore current task process again hereafter.If the encrypted authentication knot
Fruit is not verified, then does not interrupt or terminate current task, and robot is judged as the interference or malicious interference of non-user.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 3, monitoring the current task process
In whether there is the interference incident to include:
Whether step S302, monitoring in the current task process has the first interference incident, wherein described first is dry
The event of disturbing includes at least: a robot external disturbance event;
If there is interference incident, then executing preset cryptographic verifying operation includes:
Step S304 then executes preset encryption before responding first interference incident and tests if there is the first interference incident
Card operation.
Specifically, by monitoring in the current task process whether have the first interference incident, judge to the machine
The external disturbance event of device people, and then executed in advance before responding the external disturbance event according to the external disturbance event
Set cryptographic verifying operation.For example, robot external disturbance event can be, the robot is carrying out explanation task, at this time
There is external session request.Or the robot is carrying out cruise task, has applied external force to hinder robot at this time.Work as institute
When stating the generation of robot external disturbance event, need to execute preset encrypted authentication before responding the robot external disturbance event
Operation.For example, input password authentification.
Be also when it should be noted that whether having the generation of the first interference incident by monitoring in the current task process by
Caused by abnormal operation.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 4, monitoring the current task process
In whether there is the interference incident to include:
Whether step S402, monitoring in the current task process has the second interference incident, wherein the interference
Event includes at least: a robot interior interference incident;
If there is interference incident, then executing preset cryptographic verifying operation includes:
Step S404 then executes preset encryption after responding second interference incident and tests if there is the second interference incident
Card operation.
Specifically, by monitoring in the current task process whether have the second interference incident, judge to the machine
The external disturbance event of device people, and then executed in advance before responding the internal interference event according to the internal interference event
Set cryptographic verifying operation.For example, robot interior interference incident can be, the robot is carrying out explanation task, at this time
There is internal update request of data.Or the robot is carrying out cruise task, there is charge inside request at this time.When the machine
When device people's internal interference event occurs, need to execute preset encrypted authentication behaviour before responding the robot external disturbance event
Make.For example, input password authentification.
Be also when it should be noted that whether having the generation of the second interference incident by monitoring in the current task process by
Caused by abnormal operation.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 5, obtaining the current task of robot
Process includes:
Step S502 obtains the multiple tasks of robot configuration;
Step S504 determines at least one task that robot is currently executing;
Step S506 obtains current task process according at least one described task.
Specifically, by obtaining the preconfigured multiple tasks of robot, it can determine that the robot works as
Before at least one described task for being carrying out obtain presently described robot by least one described task and be carrying out
At least one task process.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions
It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not
The sequence being same as herein executes shown or described step.
According to the embodiment of the present application, additionally provide a kind of for implementing the dress of the above-mentioned processing for robot task encryption
It sets, as shown in fig. 6, the device includes:
Module 10 is obtained, for obtaining the current task process of robot;
The execution state for obtaining the current task of the robot can be judged by current task process.The application is implemented
Current task process in example refers to that the robot is carrying out the performance level of current task.
The current task process is depending on the performance of task the application.
Module 20 is monitored, for monitoring in the current task process whether have interference incident;
Whether have interference incident can be, if having extraneous interference incident if monitoring in the current task process.
For example, the extraneous session request access having other than non-user.For another example, the extraneous request of exiting having other than non-user accesses.Again
For example, the extraneous manual intervention having other than multiple non-user.
Whether have interference incident be also possible to, if dry inside organic device people if monitoring in the current task process
Disturb event.For example, event is exited in inside.For another example, internal frequent data item request.
Execution module 30, for when occurring if there is interference incident, then executing preset cryptographic verifying operation;
Occurred by judging whether there is the interference incident, if there is there are interference incidents, then can be executed in robot
Preset cryptographic verifying operation can verify whether current interference incident is that non-user is disliked by the preset cryptographic verifying operation
Meaning operation or the maloperation of user.
The preset cryptographic verifying operation can be Crypted password verification operation, crypto identity verification operation, encrypted ones
Verification operation etc..
It should be noted that specific cryptographic verifying operation is not defined in embodiments herein, as long as
It is able to verify that requirement.
Judgment module 40, for according to the encrypted authentication as a result, judge whether interrupt or terminate current task.
According to the encrypted authentication as a result, robot can decide whether to need to interrupt current task or terminate as predecessor
Business.
It interrupts current task to refer to, there is no completions for the current task process of the robot, so if it is normal
Request is exited, then task of terminal being needed to be currently executing.
Stop current task and refers to that the current task process of the robot has been completed but do not exited also, so if
It is normally to exit request, then needs terminal when stopping current task.
It can be seen from the above description that the application realizes following technical effect:
Processing unit for robot task encryption in the embodiment of the present application, using the current task for obtaining robot
The mode of process has been reached if there is interference incident by monitoring in the current task process whether have interference incident,
The purpose of preset cryptographic verifying operation is then executed, to realize according to the encrypted authentication as a result, judging whether to interrupt or tie
The technical effect of beam current task, and then solve easy disturbed technical problem when robot task execution.
According to the embodiment of the present application, as preferred in the present embodiment, if the judgment module 400 is used for the encryption
The current task process has terminated when verification result is verified, then terminates current task;If the encrypted authentication result
The current task process is not finished when being verified, then interrupts current task process;If the encrypted authentication result is not tested
Card passes through, then does not interrupt or terminate current task.
Specifically, if the encrypted authentication result verification when passing through the current task process terminated, the machine
Device people directly terminates current task.If the encrypted authentication result verification when passing through the current task process be not finished,
The robot can interrupt current task process, and restore current task process again hereafter.If the encrypted authentication knot
Fruit is not verified, then does not interrupt or terminate current task, and robot is judged as the interference or malicious interference of non-user.
According to the embodiment of the present application, as preferred in the present embodiment, the monitoring module 200 include: monitor described in work as
Whether first interference incident is had in preceding task process, wherein first interference incident includes at least: outside a robot
Portion's interference incident;The execution module includes: then to execute before responding first interference incident if there is the first interference incident
Preset cryptographic verifying operation.
Specifically, by monitoring in the current task process whether have the first interference incident, judge to the machine
The external disturbance event of device people, and then executed in advance before responding the external disturbance event according to the external disturbance event
Set cryptographic verifying operation.For example, robot external disturbance event can be, the robot is carrying out explanation task, at this time
There is external session request.Or the robot is carrying out cruise task, has applied external force to hinder robot at this time.Work as institute
When stating the generation of robot external disturbance event, need to execute preset encrypted authentication before responding the robot external disturbance event
Operation.For example, input password authentification.
Be also when it should be noted that whether having the generation of the first interference incident by monitoring in the current task process by
Caused by abnormal operation.
According to the embodiment of the present application, as preferred in the present embodiment, the monitoring module 200 is used for, and is worked as described in monitoring
Whether second interference incident is had in preceding task process, wherein the interference incident includes at least: a robot interior
Interference incident;The execution module is used for, and if there is the second interference incident, is then executed after responding second interference incident pre-
Set cryptographic verifying operation.
Specifically, by monitoring in the current task process whether have the second interference incident, judge to the machine
The external disturbance event of device people, and then executed in advance before responding the internal interference event according to the internal interference event
Set cryptographic verifying operation.For example, robot interior interference incident can be, the robot is carrying out explanation task, at this time
There is internal update request of data.Or the robot is carrying out cruise task, there is charge inside request at this time.When the machine
When device people's internal interference event occurs, need to execute preset encrypted authentication behaviour before responding the robot external disturbance event
Make.For example, input password authentification.
Be also when it should be noted that whether having the generation of the second interference incident by monitoring in the current task process by
Caused by abnormal operation.
According to the embodiment of the present application, as preferred in the present embodiment, the acquisition module 100 is matched for obtaining robot
The multiple tasks set;Determine at least one task that robot is currently executing;According at least one described task, acquisition is worked as
Preceding task process.
Specifically, by obtaining the preconfigured multiple tasks of robot, it can determine that the robot works as
Before at least one described task for being carrying out obtain presently described robot by least one described task and be carrying out
At least one task process.
Obviously, those skilled in the art should be understood that each module of above-mentioned the application or each step can be with general
Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed
Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored
Be performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by they
In multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the application be not limited to it is any specific
Hardware and software combines.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field
For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair
Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.
Claims (10)
1. a kind of processing method for robot task encryption characterized by comprising
Obtain robot current task process, wherein the current task process refer to robot execute preset task into
Journey;
Whether have interference incident, wherein described have interference incident to refer to interference robot if monitoring in the current task process
Complete the trigger event of the preset task process executed;
If there is interference incident, then preset cryptographic verifying operation is executed;
According to the encrypted authentication as a result, judging whether to interrupt or terminate current task.
2. processing method according to claim 1, which is characterized in that according to the encrypted authentication as a result, judging whether in
Breaking or terminate current task includes:
If the encrypted authentication result verification when passing through the current task process terminated, terminate current task;
If the encrypted authentication result verification when passing through the current task process be not finished, interrupt current task process;
If the encrypted authentication result is not verified, current task is not interrupted or terminated.
3. processing method according to claim 1, which is characterized in that
Whether monitor has the interference incident to include: in the current task process
Whether have first interference incident, wherein first interference incident at least wraps if monitoring in the current task process
It includes: a robot external disturbance event;
If there is interference incident, then executing preset cryptographic verifying operation includes:
If there is the first interference incident, then preset cryptographic verifying operation is executed before responding first interference incident.
4. processing method according to claim 1, which is characterized in that
Whether monitor has the interference incident to include: in the current task process
Whether have second interference incident, wherein the interference incident includes at least if monitoring in the current task process:
One robot interior interference incident;
If there is interference incident, then executing preset cryptographic verifying operation includes:
If there is the second interference incident, then preset cryptographic verifying operation is executed after responding second interference incident.
5. processing method according to claim 1, which is characterized in that the current task process for obtaining robot includes:
Obtain the multiple tasks of robot configuration;
Determine at least one task that robot is currently executing;
According at least one described task, current task process is obtained.
6. a kind of processing unit for robot task encryption characterized by comprising
Module is obtained, for obtaining the current task process of robot;
Module is monitored, for monitoring in the current task process whether have interference incident;
Execution module, for when occurring if there is interference incident, then executing preset cryptographic verifying operation;
Judgment module, for according to the encrypted authentication as a result, judge whether interrupt or terminate current task.
7. processing unit according to claim 1, which is characterized in that the judgment module is used for,
When the encrypted authentication result verification passes through the current task process at the end of, then terminate current task;
When the current task process is not finished when the encrypted authentication result verification passes through, then current task process is interrupted;
When the encrypted authentication result is not verified, then current task is not interrupted or terminates.
8. processing unit according to claim 1, which is characterized in that the monitoring module is used for,
Whether have first interference incident, wherein first interference incident at least wraps if monitoring in the current task process
It includes: a robot external disturbance event;
The execution module is used for,
When if there is the first interference incident, then preset cryptographic verifying operation is executed before responding first interference incident.
9. processing unit according to claim 1, which is characterized in that
The monitoring module is used for,
Whether have second interference incident, wherein the interference incident includes at least if monitoring in the current task process:
One robot interior interference incident;
The execution module is used for,
When if there is the second interference incident, then preset cryptographic verifying operation is executed after responding second interference incident.
10. processing unit according to claim 1, which is characterized in that the acquisition module is used for,
Obtain the multiple tasks of robot configuration;
Determine at least one task that robot is currently executing;
According at least one described task, current task process is obtained.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2019103643320 | 2019-04-30 | ||
CN201910364332 | 2019-04-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110427753A true CN110427753A (en) | 2019-11-08 |
Family
ID=68410588
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910670702.3A Pending CN110427753A (en) | 2019-04-30 | 2019-07-23 | Processing method and processing device for robot task encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110427753A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425193A (en) * | 2008-11-14 | 2009-05-06 | 林江峰 | Household intelligent terminal for confirming authority using identity by finger print |
CN104154925A (en) * | 2014-08-25 | 2014-11-19 | 正量电子科技(苏州)有限公司 | Guidance navigation method based on radio frequency identification |
CN105956484A (en) * | 2016-04-22 | 2016-09-21 | 广东小天才科技有限公司 | Safe interaction method and system of intelligent terminal |
CN106250730A (en) * | 2016-07-19 | 2016-12-21 | 福州瑞芯微电子股份有限公司 | A kind of intelligent watch unlocking method and a device |
CN108563941A (en) * | 2018-07-02 | 2018-09-21 | 信利光电股份有限公司 | A kind of intelligent home equipment control method, intelligent sound box and intelligent domestic system |
CN108737360A (en) * | 2017-09-29 | 2018-11-02 | 北京猎户星空科技有限公司 | Control method, device, robot device and the storage medium of robot |
CN109343821A (en) * | 2018-10-25 | 2019-02-15 | 珠海格力电器股份有限公司 | Sound playing method, device, storage medium and electronic device |
US20190058586A1 (en) * | 2017-08-18 | 2019-02-21 | Samsung Electronics Co., Ltd. | METHOD AND AN APPARATUS FOR ONBOARDING IN AN IoT NETWORK |
-
2019
- 2019-07-23 CN CN201910670702.3A patent/CN110427753A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425193A (en) * | 2008-11-14 | 2009-05-06 | 林江峰 | Household intelligent terminal for confirming authority using identity by finger print |
CN104154925A (en) * | 2014-08-25 | 2014-11-19 | 正量电子科技(苏州)有限公司 | Guidance navigation method based on radio frequency identification |
CN105956484A (en) * | 2016-04-22 | 2016-09-21 | 广东小天才科技有限公司 | Safe interaction method and system of intelligent terminal |
CN106250730A (en) * | 2016-07-19 | 2016-12-21 | 福州瑞芯微电子股份有限公司 | A kind of intelligent watch unlocking method and a device |
US20190058586A1 (en) * | 2017-08-18 | 2019-02-21 | Samsung Electronics Co., Ltd. | METHOD AND AN APPARATUS FOR ONBOARDING IN AN IoT NETWORK |
CN108737360A (en) * | 2017-09-29 | 2018-11-02 | 北京猎户星空科技有限公司 | Control method, device, robot device and the storage medium of robot |
CN108563941A (en) * | 2018-07-02 | 2018-09-21 | 信利光电股份有限公司 | A kind of intelligent home equipment control method, intelligent sound box and intelligent domestic system |
CN109343821A (en) * | 2018-10-25 | 2019-02-15 | 珠海格力电器股份有限公司 | Sound playing method, device, storage medium and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106156619B (en) | Application security protection method and device | |
CN102624677B (en) | Method and server for monitoring network user behavior | |
CN109766700A (en) | Access control method and device, the storage medium, electronic device of file | |
CN104361285B (en) | The safety detection method and device of mobile device application program | |
CN104767713B (en) | Account binding method, server and system | |
KR100966073B1 (en) | Apparatus and method for managing terminal users | |
CN103168458A (en) | Method for managing keys in a manipulation-proof manner | |
TW201810109A (en) | Processing method for preventing copy attack, server and client | |
CN110046514B (en) | Debug data protection method, device, server and storage medium | |
CN106789986A (en) | Monitoring device authentication method and device | |
CN106254329A (en) | For the method protecting computer network security | |
CN108847930A (en) | A kind of data transmission method, device and fire-fighting system | |
CN106209847A (en) | Electric data transmission method and device | |
CN104318156A (en) | Progress access safety method and system | |
CN114528602B (en) | Security chip operation method and device based on attack detection behavior | |
CN105592459B (en) | Safety certification device based on wireless communication | |
CN103200562A (en) | Communication terminal locking method and communication terminal | |
CN106209844A (en) | The electric power safety means of communication | |
CN106684985B (en) | Wireless charging control method and wireless charging device | |
CN106569918A (en) | Data backup method and mobile terminal | |
CN110099041A (en) | A kind of Internet of Things means of defence and equipment, system | |
CN112312400B (en) | Access control method, access controller and storage medium | |
CN110427753A (en) | Processing method and processing device for robot task encryption | |
US10788809B2 (en) | Method for the enabling of machine functions on a spinning-mill machine | |
CN106034132A (en) | Protection Method and Computer System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191108 |
|
RJ01 | Rejection of invention patent application after publication |