CN110858250A - Desensitization encryption method for sending information by mobile equipment chat tool - Google Patents

Desensitization encryption method for sending information by mobile equipment chat tool Download PDF

Info

Publication number
CN110858250A
CN110858250A CN201810977467.XA CN201810977467A CN110858250A CN 110858250 A CN110858250 A CN 110858250A CN 201810977467 A CN201810977467 A CN 201810977467A CN 110858250 A CN110858250 A CN 110858250A
Authority
CN
China
Prior art keywords
service
auxiliary
class
content
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810977467.XA
Other languages
Chinese (zh)
Inventor
吕法文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Huaruan Goldencis Software Co Ltd
Original Assignee
Shandong Huaruan Goldencis Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Huaruan Goldencis Software Co Ltd filed Critical Shandong Huaruan Goldencis Software Co Ltd
Priority to CN201810977467.XA priority Critical patent/CN110858250A/en
Publication of CN110858250A publication Critical patent/CN110858250A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A desensitization encryption method for sending information by a mobile device chat tool comprises the following steps: the first step is as follows: defining a Service class in an android, and then enabling the class to inherit from an auxiliary class; the second step is that: further declaring the service class in the first step in a configuration file automatically generated by the android project; the third step: implementing an auxiliary service event processing method and an auxiliary service terminal method in a subclass service; the fourth step: finding the auxiliary class realized in the third step by the auxiliary function in the mobile phone setting, and then opening the auxiliary class; the fifth step: according to a strategy of a secret field issued from a server, then, according to the monitored text content, starting an examination mechanism, and judging whether the content is monitored to have violation behaviors or not; the invention can acquire and monitor the content input by the soft keyboard and then carry out mandatory encryption desensitization on the sensitive words designed in the monitored content.

Description

Desensitization encryption method for sending information by mobile equipment chat tool
Technical Field
The invention relates to the technical field of computers, in particular to a desensitization encryption method for sending information by a mobile device chat tool.
Background
At present, the efforts of disclosure protection of sensitive information and tracing of disclosure personnel in departments or institutions with higher disclosure are increasing, for example, instant messaging software is not allowed to be used in related departments or some related disclosure or sensitive characters are sent to third party forums, and the sent character contents are monitored so as to execute related examination mechanisms and trace the disclosure personnel.
Within existing solutions, it is common to force modifications of the transmitted content by the root handset and then use an xposed framework or the like, or not allow use of certain modules of the application.
Any desired data can be acquired to a great extent through a root mode, and the functions which can be realized only by a plurality of system layers can be realized through the improvement of the authority after the root, such as: the three-party data forcibly modifies or disables some functions of the three-party application, but the scheme is that the android device acquires the root authority, the physical characteristics of hardware and the standards of various hardware manufacturers are different, and the mobile phone after the root has great potential safety hazard and is easily invaded by trojans and viruses.
Disclosure of Invention
In order to solve the technical defects, the invention provides a desensitization encryption method for sending information by a mobile device chatting tool. According to the method and the device, the android device is not required to acquire Root authority, and the input content can be well monitored as long as the user inputs the content by using the software disk on the android device. The invention can acquire and monitor the content input by the soft keyboard and then carry out mandatory encryption desensitization on the sensitive words designed in the monitored content.
In order to achieve the purpose, the invention adopts the technical scheme that: a desensitization encryption method for sending information by a mobile device chat tool comprises the following steps:
the first step is as follows: defining a service class in an android, then enabling the service class to inherit from an auxiliary class, rewriting a service connection configuration initialization method, an auxiliary service event processing method and an auxiliary service terminal method in the auxiliary class in the service class, and elaborating in detail the aims of achieving the function of using the auxiliary class to audit pictures, achieving the monitoring of sent pictures and releasing and storing after monitoring the sent pictures in the rewriting method;
the second step is that: further declaring the service class in the first step in a configuration file automatically generated by the android project; adding a binding auxiliary service authority into a declared service class, adding a meta-data tag into the declared service, and defining and configuring a name and a resource configuration file in the tag;
the third step: implementing an auxiliary service event processing method and an auxiliary service terminal method in a subclass service;
the fourth step: finding the auxiliary class realized in the third step by the auxiliary function in the mobile phone, and then opening the auxiliary class to execute the method in the third step to perform monitoring and auditing of the character series;
the fifth step: according to a strategy of a secret field issued from a server, then, according to the monitored text content, starting an examination mechanism, and judging whether the content is monitored to have violation behaviors or not; if the content acquired from the fourth step contains a secret-related field strategy, forcibly executing the steps of copying, cutting, desensitizing and pasting from the character input box by using an auxiliary function to realize the desensitizing method of the sensitive vocabulary;
and a sixth step: and adding a method for detecting whether the auxiliary function is started or not in the android program to be applied, wherein the method can remind a user to start and execute the step in the fourth step after the auxiliary function is closed in the application.
In order to further realize the invention, the technical scheme can be also adopted as follows: the contents to be configured in the second step comprise interface changes which are interesting to the service, a feedback mode is defined, whether the service can access the contents in the active window or not is defined, and a time interval for receiving events is defined. The method implemented in the subclass service in the third step is also a service connection configuration initialization method. The method implemented in the subclass service in the third step also has an auxiliary function closing method. The interesting interface changes comprise window opening, sliding, focus changing and long pressing; defining a feedback mode to be voice playing, vibration or visual feedback; the time interval for accepting an event is defined to be one hundred milliseconds.
The invention has the beneficial effects that:
the method mainly adopts auxiliary function type Android access in an Android system to realize the acquisition of the contents of all nodes of view in a screen, button click events of an input method soft keyboard and character contents typed by the soft keyboard, so that the acquired contents are monitored, whether the violation phenomenon occurs in the input contents is judged according to a self-defined examination mechanism, and a sent desensitization field or vocabulary is forcibly changed into a symbol, so that the aim that the designed sensitive vocabulary cannot be sent out is fulfilled.
The method avoids the defects that the equipment must Root and the special requirements on equipment hardware and manufacturer customized system standards are needed on the basis that the content sent by the three-party application can be forcibly changed by utilizing the Root authority, the user can acquire the input content when inputting the content by using the soft keyboard, then forcibly encrypts and desensitizes the sensitive vocabulary designed in the input content, and the method can achieve good supporting effect on various input methods and the system default Google input method soft keyboard.
The method and the device can acquire any text content input by the user through the input method soft keyboard, can adapt to any android equipment capable of installing the input method, and have no limit on the android system to be compatible with various high and low version systems and various android customization systems. When a user on the equipment uses an instant tool for chatting or uses a third party forum, a microblog and the like to input text content by using an input method soft keyboard, the user can acquire and monitor the input content and then forcibly encrypt and desensitize sensitive words designed in the monitored content.
According to the method and the device, the android device is not required to acquire Root authority, and the input content can be well monitored as long as the user inputs the content by using the software disk on the android device. The method has no hard requirements on android equipment hardware, an android system-based deep customization system of each large mobile phone manufacturer and installed software, and has strong universality. The invention does not need to use a third-party framework to forcibly modify the self realization mechanism of the interception application, can be realized by the instant chat application installed on the android device, and has high practicability.
Drawings
FIG. 1 is a block flow diagram of a first step of the present invention;
FIG. 2 is a block flow diagram of the present invention;
FIG. 3 is a block diagram of a method for implementing the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The English abbreviations or technical nouns involved in the present embodiment are explained as follows:
service is a component that runs in the background for an indefinite period of time without interacting with the user, and is invisible with nothing interfacing. We can start a Service to play music or to record the change of location of the geographical information or start a Service to run and listen for some action at all times.
metadata is a set of name-value pairs (name-value pair) for use by a parent component, so that a corresponding meta-data element should be defined in the corresponding component. I.e. if metadata is to be used in activity, then meta-data must be defined in the activity declaration of android manifest.
Access availability: many Android users have different ways to interact with the cell phone due to various conditions. This includes users who are unable to see a complete screen or use a touch screen due to visual, physical, and age problems, and users who are less hearing able who are unable to receive voice messages and prompts. Android provides Accessibility functionality and services that help these users to operate the device more easily, including text-to-speech (which does not support Chinese), tactile feedback, gestural manipulation, trackball and joystick manipulation. Developers can make use of these services to make programs better. Developers may build their own Accessibility services, which may enhance usability, such as voice prompts, physical feedback, and other optional modes of operation. The Accessibility service may provide these enhanced functionality for all applications, a group of applications, or a single application.
Event sources: for events generated by an interface control, we generally refer to the control as an event source.
Android (Android): the operating system is a Linux-based free and open source code operating system, is mainly used for mobile equipment such as smart phones and tablet computers, and is led and developed by Google corporation and the open mobile phone alliance.
onServiceConnected: service connection configuration initialization method.
onAccessibilityEvent: a method for assisting in the handling of service events.
onInterrupt: a method for assisting a service terminal.
onUnbind: method for auxiliary function shutdown.
A desensitization encryption method for sending information by a mobile device chat tool, as shown in fig. 1 to 2, comprising the following steps:
the first step is as follows: defining a Service class in an android, then enabling the class to inherit from an auxiliary class, and rewriting three methods in the auxiliary class in the Service class, wherein the three methods are a Service connection configuration initialization method (onServiceConnected), an auxiliary Service event processing method (onaccessibivievent) and an auxiliary Service terminal method (onintercept); detailed explanation is respectively realized in the rewriting method on how to realize the desensitization encryption method, how to use the auxiliary class to complete the realization of the desensitization encryption method function, how to realize the monitoring of the input content and how to release and store after monitoring the data, and the flow of the step is shown in fig. 1; the second step is that: further declaring the service class in the first step in a configuration file automatically generated by the android project; adding a binding auxiliary service authority into a declared service class, adding a meta-data tag into the declared service, and defining and configuring a name and a resource configuration file in the tag; the specific configuration content is as follows:
(1) the service is interested in which changes in the interface, i.e. which event notifications, such as window open, slide, focus change, long press, etc., within the present technology we need the notifications defined herein to be get layout type focus notifications and text layout content change notifications.
(2) Defining feedback means, such as voice play, vibration or visual feedback, where the defined notification means of visual feedback is needed within the present technology.
(3) If you want to obtain the formatting of the frame content in the service, here the technology needs to set its value to true.
(4) The time interval for accepting the event is defined, and the time interval can be customized according to requirements, and a time format is calculated by taking milliseconds as a unit, wherein the time format is set to be one hundred milliseconds in the technology.
The added meta-data tag configuration information may be defined in the resource file, or may be configured in the defined Service, generally in the Service class rewritten Service connection configuration initialization method.
The third step: an auxiliary service event processing method (onaccessibirityevent) and an auxiliary service terminal method (onanterrupt) are realized in the subclass service;
an auxiliary service event processing method (onaccesibilitityevent) is a core method of the present invention, wherein a parameter event encapsulates information from an interface-related event, for example, an event type of the event can be obtained, and different processing modes are selected according to the starting type, most functions of the desensitization encryption method for sending information by a chat tool of the present invention are monitored by the method memorability, when a monitored picture layout event is registered, when the event occurs or is called, the defined auxiliary service event processing method is notified, for example: when the user uses the chatting tool to send pictures, the auxiliary service event processing method is called, then corresponding processing is carried out in the auxiliary service event processing method, the state that the user sends the pictures can be monitored, and then screen capture operation is carried out.
If the event source is a tree structure, a set of all values with a text attribute on the tree is acquired at the moment, and then the content input by the user can be acquired through the event source which is currently touched and executed and the text information and the text set of the event source.
The onInterrupt method is invoked when the system wants to interrupt the response returned by the accessibility service, and is invoked many times throughout the life cycle.
The fourth step: finding the auxiliary class realized in the third step by the auxiliary function in the mobile phone, and then opening the auxiliary class to execute the method in the third step to perform monitoring and auditing of the character series;
the fifth step: according to a strategy of a secret field issued from a server, then, according to the monitored text content, starting an examination mechanism, and judging whether the content is monitored to have violation behaviors or not; if the content acquired from the fourth step contains a secret-related field strategy, forcibly executing the steps of copying, cutting, desensitizing and pasting from the character input box by using an auxiliary function to realize the desensitizing method of the sensitive vocabulary;
and a sixth step: and adding a method for detecting whether the auxiliary function is started in the program, wherein the method can remind a user to start and execute the step in the fourth step after the auxiliary function is closed.
The method mainly adopts auxiliary function type Android access in an Android system to realize the acquisition of the contents of all nodes of view in a screen, button click events of an input method soft keyboard and character contents typed by the soft keyboard, so that the acquired contents are monitored, whether the violation phenomenon occurs in the input contents is judged according to a self-defined examination mechanism, and a sent desensitization field or vocabulary is forcibly changed into a symbol, so that the aim that the designed sensitive vocabulary cannot be sent out is fulfilled.
The method avoids the defects that the equipment must Root and the special requirements on equipment hardware and manufacturer customized system standards are needed on the basis that the content sent by the three-party application can be forcibly changed by utilizing the Root authority, the user can acquire the input content when inputting the content by using the soft keyboard, then forcibly encrypts and desensitizes the sensitive vocabulary designed in the input content, and the method can achieve good supporting effect on various input methods and the system default Google input method soft keyboard.
The method and the device can acquire any text content input by the user through the input method soft keyboard, can adapt to any android equipment capable of installing the input method, and have no limit on the android system to be compatible with various high and low version systems and various android customization systems. When a user on the equipment uses an instant tool for chatting or uses a third party forum, a microblog and the like to input text content by using an input method soft keyboard, the user can acquire and monitor the input content and then forcibly encrypt and desensitize sensitive words designed in the monitored content.
The method implemented in the subclass service in the third step of the present invention may further include a service connection configuration initialization method (onServiceConnected). The system will call this method when the connection to the service is successful, in which method an initialization can be done, for example the sound shock management of the device, or a configuration can be done using the service information configuration method.
The method implemented in the subclass service in the third step of the present invention may also have an auxiliary function shutdown method (onUnbind). This accessibility service is invoked when the system is about to shut down. In this method some work is done to release resources.
As shown in fig. 3, the implementation method of the present invention is:
step 1) downloading a strategy built in a server at a mobile terminal, wherein the strategy is a command for executing picture audit.
And 2) judging whether the current strategy contains the sub-strategy of the confidential field, if so, indicating that the client is required to execute a scheme of inputting character monitoring, and then desensitizing sensitive words on the basis of character monitoring.
And judging whether the auxiliary function of the current application is started, if so, monitoring for acquiring the text content is executed, and if not, the program automatically opens a set-auxiliary function interface to find the corresponding application name for selection.
When the judgment of whether the auxiliary function is started or not is carried out, the judgment method is put in one service for carrying out judgment at any time, so that the user can be reminded that the auxiliary function is not started at the same time when the auxiliary function is closed, and the user is guided to set the auxiliary function for checking the corresponding application.
And 3) opening any application needing to write the content by using the soft keyboard, inputting the content to be edited in the popped soft keyboard, and monitoring all the contents from the first character to the last character input by the program.
And 4) according to the sensitive words in the secret-related field strategy issued by the server, performing steps of copying, cutting, desensitizing and pasting on all the character contents input in the input frame monitored in the step 3) to perform desensitization operation on the data.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.

Claims (7)

1. A desensitization encryption method for sending information by a mobile device chat tool is characterized by comprising the following steps:
the first step is as follows: defining a service class in an android, then enabling the service class to inherit from an auxiliary class, rewriting a service connection configuration initialization method, an auxiliary service event processing method and an auxiliary service terminal method in the auxiliary class in the service class, and elaborating in detail the aims of achieving the function of using the auxiliary class to audit pictures, achieving the monitoring of sent pictures and releasing and storing after monitoring the sent pictures in the rewriting method;
the second step is that: further declaring the service class in the first step in a configuration file automatically generated by the android project; adding a binding auxiliary service authority into a declared service class, adding a meta-data tag into the declared service, and defining and configuring a name and a resource configuration file in the tag;
the third step: implementing an auxiliary service event processing method and an auxiliary service terminal method in a subclass service;
the fourth step: finding the auxiliary class realized in the third step by the auxiliary function in the mobile phone, and then opening the auxiliary class to execute the method in the third step to perform monitoring and auditing of the character series;
the fifth step: according to a strategy of a secret field issued from a server, then, according to the monitored text content, starting an examination mechanism, and judging whether the content is monitored to have violation behaviors or not; if the content acquired from the fourth step contains a secret-related field strategy, forcibly executing the steps of copying, cutting, desensitizing and pasting from the character input box by using an auxiliary function to realize the desensitizing method of the sensitive vocabulary;
and a sixth step: and adding a method for detecting whether the auxiliary function is started or not in the android program to be applied, wherein the method can remind a user to start and execute the step in the fourth step after the auxiliary function is closed in the application.
2. The method of claim 1, wherein the encryption is applied to a mobile device chat facility for desensitizing the transmission of messages, wherein: the contents to be configured in the second step comprise interface changes which are interesting to the service, a feedback mode is defined, whether the service can access the contents in the active window or not is defined, and a time interval for receiving events is defined.
3. The method of claim 1, wherein the encryption is applied to a mobile device chat facility for desensitizing the transmission of messages, wherein: the method implemented in the subclass service in the third step is also a service connection configuration initialization method.
4. A method of desensitising encryption of messages sent by a mobile device chat facility according to claim 1 or 3, characterised in that: the method implemented in the subclass service in the third step also has an auxiliary function closing method.
5. The method of claim 2, wherein the encryption is applied to a mobile device chat facility for sending messages, and wherein: the interface changes that are of interest to the service include window opening, sliding, focus change, and long press.
6. A method of desensitising encryption of messages sent by a mobile device chat facility according to claim 2 or 5, characterised in that: the defined feedback mode is voice playing, vibration or visual feedback.
7. The method of claim 6, wherein the encryption is applied to a mobile device chat facility for sending messages, and wherein: the time interval defining the acceptance event is one hundred milliseconds.
CN201810977467.XA 2018-08-24 2018-08-24 Desensitization encryption method for sending information by mobile equipment chat tool Pending CN110858250A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810977467.XA CN110858250A (en) 2018-08-24 2018-08-24 Desensitization encryption method for sending information by mobile equipment chat tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810977467.XA CN110858250A (en) 2018-08-24 2018-08-24 Desensitization encryption method for sending information by mobile equipment chat tool

Publications (1)

Publication Number Publication Date
CN110858250A true CN110858250A (en) 2020-03-03

Family

ID=69635706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810977467.XA Pending CN110858250A (en) 2018-08-24 2018-08-24 Desensitization encryption method for sending information by mobile equipment chat tool

Country Status (1)

Country Link
CN (1) CN110858250A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113468620A (en) * 2021-07-21 2021-10-01 赞同科技股份有限公司 Method and device for realizing safety keyboard

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850241A (en) * 2015-05-28 2015-08-19 北京奇点机智信息技术有限公司 Mobile terminal and text input method thereof
CN106603540A (en) * 2016-12-21 2017-04-26 北京天融信网络安全技术有限公司 Method and device for monitoring instant communication information
CN106845218A (en) * 2016-12-22 2017-06-13 山东华软金盾软件股份有限公司 A kind of word auditing method of mobile device
US20170316220A1 (en) * 2015-01-21 2017-11-02 Secure Islands Technologies Ltd Method for allowing data classification in inflexible software development environments

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170316220A1 (en) * 2015-01-21 2017-11-02 Secure Islands Technologies Ltd Method for allowing data classification in inflexible software development environments
CN104850241A (en) * 2015-05-28 2015-08-19 北京奇点机智信息技术有限公司 Mobile terminal and text input method thereof
CN106603540A (en) * 2016-12-21 2017-04-26 北京天融信网络安全技术有限公司 Method and device for monitoring instant communication information
CN106845218A (en) * 2016-12-22 2017-06-13 山东华软金盾软件股份有限公司 A kind of word auditing method of mobile device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113468620A (en) * 2021-07-21 2021-10-01 赞同科技股份有限公司 Method and device for realizing safety keyboard

Similar Documents

Publication Publication Date Title
US10257334B1 (en) Wireless device gesture detection and operational control
US7774713B2 (en) Dynamic user experience with semantic rich objects
CN109491567B (en) Message reply method, device, terminal and storage medium
US20150334118A1 (en) Method and apparatus for clearing notification icon, and storage medium
CN114237399B (en) Haptic feedback method, apparatus, medium, and device
US20190005228A1 (en) Trusted and untrusted code execution in a workflow
CN112732386A (en) Message processing method, device, terminal and storage medium
CN110574006B (en) System and method for automatically synchronizing responses and conditions on a device
US20240086849A1 (en) Creating tracked issue using issue-creation emoji icon
JP2024508452A (en) Hosting event-based applications
TWI658401B (en) Mobile communication device based on virtual mobile infrastructure and related input method switching methods thereof
CN107436802B (en) Control method, system, medium and computing device for application program
CN111970192B (en) Information editing method and device based on session group
CN110858250A (en) Desensitization encryption method for sending information by mobile equipment chat tool
CN107515666A (en) A kind of data managing method and terminal
WO2022037627A1 (en) Integrated management method, apparatus and system for artificial intelligence applications
CN110858174A (en) Picture auditing method for mobile device chat software
CN109189536A (en) A kind of terminal applies display methods and system
CN108897479A (en) A kind of terminal touch control method and system
CN113343138A (en) Rollback interception method and device, intelligent terminal and storage medium
WO2012055176A1 (en) Processing method for mobile terminal and mobile terminal
US11659021B2 (en) Asynchronous distributed modular function calling
WO2024131568A1 (en) Session information processing method and related device
WO2023154833A1 (en) Encoding/decoding user interface interactions
Anumula Auto profile

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200303

RJ01 Rejection of invention patent application after publication