CN110765428A - Behavior control method and device based on enterprise browser - Google Patents

Behavior control method and device based on enterprise browser Download PDF

Info

Publication number
CN110765428A
CN110765428A CN201910907358.5A CN201910907358A CN110765428A CN 110765428 A CN110765428 A CN 110765428A CN 201910907358 A CN201910907358 A CN 201910907358A CN 110765428 A CN110765428 A CN 110765428A
Authority
CN
China
Prior art keywords
behavior
forbidding
target
enterprise browser
disabling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910907358.5A
Other languages
Chinese (zh)
Inventor
陈本峰
冀托
张永清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunshen Interconnection (beijing) Technology Co Ltd
Original Assignee
Yunshen Interconnection (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunshen Interconnection (beijing) Technology Co Ltd filed Critical Yunshen Interconnection (beijing) Technology Co Ltd
Priority to CN201910907358.5A priority Critical patent/CN110765428A/en
Publication of CN110765428A publication Critical patent/CN110765428A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a behavior control method and a behavior control device based on an enterprise browser, wherein the method comprises the following steps: pre-configuring a behavior to be controlled and a forbidden object strategy group through a background server of the enterprise browser; wherein the forbidden object policy group contains at least one login account; receiving a disabling request which is sent by a user based on the enterprise browser and aims at a target control behavior and a target disabling object strategy group; and according to the forbidding request, obtaining a forbidding strategy which is issued by the background server and corresponds to the forbidding request, and forbidding the target control behavior on the login account in the target forbidding object strategy group based on the forbidding strategy. By adopting the behavior control method based on the enterprise browser, the more targeted setting of the behavior authority can be realized, the operation is convenient and fast, and the business data can be effectively prevented from being copied, stolen or randomly changed, so that the safety of accessing the business data based on the enterprise browser is improved.

Description

Behavior control method and device based on enterprise browser
Technical Field
The embodiment of the invention relates to the field of network data management, in particular to a behavior control method and device based on an enterprise browser, and further relates to electronic equipment and a computer-readable storage medium.
Background
In recent years, with the rapid development of network technology, providing a secure and controllable enterprise browser operation management platform for enterprises has gradually become a key point of development in the field. The enterprise browser operation management platform is an important means for realizing intelligent management of enterprises in the future, can be compatible with a Chrome kernel, an IE kernel and the like generally, and can realize deep customization and integrated management of business system data for the enterprises, so that the intelligent office requirements of the enterprises are met. However, when an enterprise manages important business data through an enterprise browser operation management platform, there is a risk of being copied, modified or stolen, which causes a great potential safety hazard to the internal data of the enterprise.
Therefore, how to realize operation behavior control based on the enterprise browser and guarantee data security become a technical problem to be solved urgently.
Disclosure of Invention
Therefore, the embodiment of the invention provides a behavior control method based on an enterprise browser, so as to solve the problem that behavior control cannot be realized based on the browser in the prior art.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a behavior control method based on an enterprise browser, including: pre-configuring a behavior to be controlled and a forbidden object strategy group through a background server of the enterprise browser; wherein the forbidden object policy group contains at least one login account; receiving a disabling request which is sent by a user based on the enterprise browser and aims at a target control behavior and a target disabling object strategy group; and according to the forbidding request, obtaining a forbidding strategy which is issued by the background server and corresponds to the forbidding request, and forbidding the target control behavior on the login account in the target forbidding object strategy group based on the forbidding strategy.
Further, the behavior control method based on the enterprise browser further includes: pre-configuring a forbidden account information list through the background server; and receiving a forbidding request which is sent by a user through the enterprise browser and aims at a target login account in the forbidding account information list, obtaining a forbidding strategy which is issued by the background server and corresponds to the forbidding request according to the forbidding request, and forbidding the target control behavior on the target login account based on the forbidding strategy.
Further, the behavior to be managed comprises at least one of copy prohibition, copy exclusion prohibition, printer prohibition, developer tool prohibition, address bar prohibition, right mouse button prohibition, and status bar prohibition.
Further, the behavior control method based on the enterprise browser further includes: obtaining work department information and work authority range information respectively corresponding to the login account; and configuring and grouping the login accounts according to the work department information and the work authority range information to obtain the forbidden object strategy group.
Further, the behavior control method based on the enterprise browser constructs a mapping relationship between the forbidden object policy group and the behavior to be controlled.
Further, in the behavior control method based on the enterprise browser, the target control behavior refers to an operation behavior that needs to be disabled and is selected based on the pre-configured behavior to be controlled.
In a second aspect, an embodiment of the present invention further provides a behavior control apparatus based on an enterprise browser, including: the system comprises a background configuration unit, a business browser and a business management unit, wherein the background configuration unit is used for pre-configuring behaviors to be controlled and forbidden object strategy groups through a background server of the business browser; wherein the forbidden object policy group contains at least one login account; the receiving unit is used for receiving a forbidding request which is sent by a user based on the enterprise browser and aims at a target management and control behavior and a target forbidding object policy group; and the policy group disabling unit is used for obtaining a disabling policy which is issued by the background server and corresponds to the disabling request according to the disabling request, and disabling the target management and control behavior for the login account in the target disabled object policy group based on the disabling policy.
Further, the behavior control device based on the enterprise browser further includes: the forbidden account information list configuration unit is used for configuring a forbidden account information list in advance through the background server; the login account disabling unit is used for receiving a disabling request which is sent by a user through the enterprise browser and aims at a target login account in the disabled account information list; and obtaining a disabling strategy corresponding to the disabling request issued by the background server according to the disabling request, and disabling the target management and control behavior for the target login account based on the disabling strategy.
Further, the behavior to be managed comprises at least one of copy prohibition, copy exclusion prohibition, printer prohibition, developer tool prohibition, address bar prohibition, right mouse button prohibition, and status bar prohibition.
Further, the behavior control device based on the enterprise browser further includes: the login account information obtaining unit is used for obtaining the work department information and the work authority range information which respectively correspond to the login account; and the forbidden object policy group configuration unit is used for configuring and grouping the login account according to the work department information and the work authority range information to obtain the forbidden object policy group.
Further, the behavior control device based on the enterprise browser further includes: and the mapping relation construction unit is used for constructing the mapping relation between the forbidden object policy group and the behavior to be controlled.
Further, the target management and control behavior refers to an operation behavior which needs to be disabled and is selected based on the pre-configured behavior to be managed and controlled.
In a third aspect, an embodiment of the present invention further provides an electronic device, including: a processor and a memory; the memory is configured to store a program of a behavior control method based on an enterprise browser, and after the electronic device is powered on and runs the program of the behavior control method based on the enterprise browser through the processor, the electronic device executes any one of the above described behavior control methods based on the enterprise browser.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium contains one or more program instructions, and the one or more program instructions are used for a server to execute any one of the above methods for behavior management based on an enterprise browser.
By adopting the behavior control method based on the enterprise browser, the more targeted setting of the behavior authority can be realized, the operation is convenient and fast, and the business data can be effectively prevented from being copied, stolen or randomly changed, so that the safety of accessing the business data based on the enterprise browser is improved, and the use experience of a user is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
Fig. 1 is a flowchart of a behavior control method based on an enterprise browser according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an enterprise browser-based behavior control apparatus according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following describes an embodiment of the behavior control method based on the enterprise browser according to the present invention in detail. As shown in fig. 1, which is a flowchart of a behavior control method based on an enterprise browser according to an embodiment of the present invention, a specific implementation process includes the following steps:
step S101: and pre-configuring behaviors to be controlled and forbidding object policy groups through a background server of the enterprise browser.
In the embodiment of the invention, the enterprise browser is compatible with a Chrome kernel, an IE kernel and the like, and can realize deep customization and integrated management of business system data based on the requirement of an enterprise. In specific implementation, the behavior to be managed and the forbidden object policy group can be configured in advance based on a background server of the enterprise browser. The behavior to be managed comprises copy prohibition, copy exclusion prohibition, printer prohibition, developer tool prohibition, address bar prohibition, right mouse button prohibition, status bar prohibition and the like. Certain behaviors (such as copying behaviors, saving as an action or printing behaviors and the like) needing to be prohibited from being executed can be generally determined as behaviors to be managed and controlled according to important business data in the enterprise.
The forbidden object policy group contains at least one login account, such as: the "research and development department" strategy group, the "finance department" strategy group, the "personnel department" strategy group, the "president" strategy group and the like. It should be noted that, the specific configuration content of the forbidden object policy group may be set in a personalized manner according to the actual needs of the enterprise user, and is not limited herein.
In a specific implementation process, the information of the work department and the information of the work authority range respectively corresponding to the login account can be obtained firstly; configuring and grouping the login accounts according to the work department information and the work authority range information to obtain the forbidden object strategy group; and constructing a mapping relation between the forbidden object policy group and the behavior to be controlled.
Step S102: and receiving a disabling request which is sent by a user based on the enterprise browser and aims at the target control behavior and the target disabling object strategy group.
After the behavior to be managed and the disabled object policy group are configured in advance based on the background server in step S101, a disabling request sent by the user based on the enterprise browser is received in this step.
In the embodiment of the present invention, the behavior to be managed may include at least one target management behavior; the forbidden object policy groups include at least one target forbidden object policy group.
The target governing behavior comprises at least one of copy prohibition, copy save prohibition, printer prohibition, developer tool prohibition, address bar prohibition, right mouse button prohibition, and status bar prohibition.
Generally, copy behaviors, save-as behaviors or print behaviors, etc. which need to be prohibited from being executed can be determined as target management behaviors for important business data in an enterprise. The target forbidden object policy group contains at least one login account, such as: the "research and development department" strategy group, the "finance department" strategy group, the "personnel department" strategy group, the "president" strategy group and the like.
Step S103: and according to the forbidding request, obtaining a forbidding strategy which is issued by the background server and corresponds to the forbidding request, and forbidding the target control behavior on the login account in the target forbidding object strategy group based on the forbidding strategy.
After the disabling request is received in step S102, the disabling policy corresponding to the disabling request issued by the background server is obtained in this step, and the target management and control behavior is disabled for the login account in the target disabled object policy group based on the disabling policy. The login account refers to an account used when the user logs in the enterprise browser, and generally includes an account name, an account password and the like.
In the embodiment of the invention, according to the disabling request sent by the enterprise browser terminal, a preset disabling program in the background server can be triggered and executed, and the target management and control behavior is prohibited to be executed by using the logging account in the target disabled object policy group by using the disabling program. The target governing behavior may include at least one of copy prohibition, printer prohibition, developer tool prohibition, address bar prohibition, right mouse button prohibition, and status bar prohibition.
In addition, in order to disable a certain login account in a more targeted manner, in the actual implementation process, a disabled account information list can be configured in advance through the background server; and receiving a forbidding request which is sent by a user through the enterprise browser and aims at a target login account in the forbidding account information list, obtaining a forbidding strategy which is issued by the background server and corresponds to the forbidding request according to the forbidding request, and forbidding the target management and control behavior on the target login account based on the forbidding strategy. The target management and control behavior refers to an operation behavior which needs to be disabled and is selected based on the pre-configured behavior to be managed.
By adopting the behavior control method based on the enterprise browser, the method can be set in a targeted manner, the intelligent management of the interior of an enterprise is facilitated, and the safety of resource access based on the enterprise browser is improved, so that the use experience of a user is improved.
Corresponding to the behavior control method based on the enterprise browser, the invention also provides a behavior control device based on the enterprise browser. Since the embodiment of the apparatus is similar to the above method embodiment, the description is simple, and please refer to the description of the above method embodiment section for relevant points, and the embodiment of the behavior control apparatus based on the enterprise browser described below is only illustrative. Fig. 2 is a schematic view of a behavior control device based on an enterprise browser according to an embodiment of the present invention.
The behavior control device based on the enterprise browser comprises the following parts:
a background configuration unit 201, configured to pre-configure a behavior to be controlled and a forbidden object policy group through a background server of the enterprise browser; wherein the forbidden object policy group contains at least one login account.
A receiving unit 202, configured to receive a disabling request sent by a user based on the enterprise browser and directed to a target management and control behavior and a target disabled object policy group.
A policy group disabling unit 203, configured to obtain, according to the disabling request, a disabling policy corresponding to the disabling request issued by the background server, and disable, based on the disabling policy, the target management and control behavior for a login account in the target disabled object policy group.
In the embodiment of the present invention, the behavior control apparatus based on an enterprise browser may further include a disabled account information list configuration unit and a login account disabling unit; the forbidden account information list configuration unit is used for configuring a forbidden account information list in advance through the background server; the login account disabling unit is used for receiving a disabling request which is sent by a user through the enterprise browser and aims at a target login account in the disabled account information list; and obtaining a disabling strategy which is issued by the background server and corresponds to the disabling request, and disabling the target control behavior for the login account in the target disabled object strategy group based on the disabling strategy. The behavior to be managed or the target management behavior may include at least one of copy inhibition, copy exclusion, printer disabling, developer tool disabling, address bar disabling, right mouse button disabling, and status bar disabling.
Furthermore, the behavior control device based on the enterprise browser further comprises a login account information obtaining unit, a forbidden object policy group configuration unit and a mapping relation construction unit; the login account information obtaining unit is used for obtaining work department information and work authority range information which respectively correspond to the login account; and the forbidden object policy group configuration unit is used for configuring and grouping the login account according to the work department information and the work authority range information to obtain the forbidden object policy group. The mapping relation construction unit is used for constructing a mapping relation between the forbidden object policy group and the behavior to be managed and controlled.
By adopting the behavior control device based on the enterprise browser, the more targeted setting of behavior authority can be realized, the operation is convenient and fast, and the business data can be effectively prevented from being copied, stolen or randomly changed, so that the safety of accessing the business data based on the enterprise browser is improved, and the use experience of a user is improved.
Corresponding to the behavior control method based on the enterprise browser, the invention further provides electronic equipment. Since the embodiment of the electronic device is similar to the above method embodiment, the description is relatively simple, and please refer to the description of the above method embodiment, and the electronic device described below is only schematic. Fig. 3 is a schematic view of an electronic device according to an embodiment of the present invention.
The electronic device specifically includes: a processor 301 and a memory 302; the memory 302 is configured to run one or more program instructions, and is configured to store a program of the enterprise browser based behavior control method, and after the server is powered on and runs the program of the enterprise browser based behavior control method through the processor 301, the server executes any one of the above described enterprise browser based behavior control methods. The electronic device can be a background server corresponding to the enterprise browser.
Corresponding to the behavior control method based on the enterprise browser, the invention also provides a computer storage medium. Since the embodiment of the computer storage medium is similar to the above method embodiment, the description is simple, and please refer to the description of the above method embodiment, and the computer storage medium described below is only schematic.
The computer storage medium contains one or more program instructions for executing the method for managing and controlling enterprise browser-based behaviors by the server. The server can be a background server corresponding to the enterprise browser, and personalized configuration can be realized according to user requirements.
In an embodiment of the invention, the processor or processor module may be an integrated circuit chip having signal processing capabilities. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
The volatile Memory may be a Random Access Memory (RAM) which serves as an external cache. By way of example and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (ddr Data Rate SDRAM), Enhanced SDRAM (ESDRAM), synclink DRAM (SLDRAM), and Direct memory bus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.

Claims (10)

1. A behavior control method based on an enterprise browser is characterized by comprising the following steps:
pre-configuring a behavior to be controlled and a forbidden object strategy group through a background server of the enterprise browser; wherein the forbidden object policy group contains at least one login account;
receiving a disabling request which is sent by a user based on the enterprise browser and aims at a target control behavior and a target disabling object strategy group;
and according to the forbidding request, obtaining a forbidding strategy which is issued by the background server and corresponds to the forbidding request, and forbidding the target control behavior on the login account in the target forbidding object strategy group based on the forbidding strategy.
2. The method of claim 1, further comprising:
pre-configuring a forbidden account information list through the background server;
receiving a forbidding request which is sent by a user through the enterprise browser and aims at a target login account in the forbidding account information list; and according to the forbidding request, obtaining a forbidding strategy which is issued by the background server and corresponds to the forbidding request, and forbidding the target management and control behavior on the target login account based on the forbidding strategy.
3. The method according to claim 1, wherein the behavior to be managed comprises at least one of copy-never, printer-disable, developer-tool-disable, address bar-disable, right mouse button-disable, and status bar-disable.
4. The method of claim 1, further comprising:
obtaining work department information and work authority range information respectively corresponding to the login account;
and configuring and grouping the login accounts according to the work department information and the work authority range information to obtain the forbidden object strategy group.
5. The enterprise browser-based behavior governance method according to claim 4, wherein a mapping relationship between the forbidden object policy group and the behavior to be governed is constructed.
6. The method according to claim 1, wherein the target management behavior refers to an operation behavior that needs to be disabled and is selected based on the pre-configured behavior to be managed.
7. The utility model provides a behavior management and control device based on enterprise browser which characterized in that includes:
the system comprises a background configuration unit, a business browser and a business management unit, wherein the background configuration unit is used for pre-configuring behaviors to be controlled and forbidden object strategy groups through a background server of the business browser; wherein the forbidden object policy group contains at least one login account;
the receiving unit is used for receiving a forbidding request which is sent by a user based on the enterprise browser and aims at a target management and control behavior and a target forbidding object policy group;
and the policy group disabling unit is used for obtaining a disabling policy which is issued by the background server and corresponds to the disabling request according to the disabling request, and disabling the target management and control behavior for the login account in the target disabled object policy group based on the disabling policy.
8. The enterprise browser-based behavior governance device of claim 7, further comprising:
the forbidden account information list configuration unit is used for configuring a forbidden account information list in advance through the background server;
the login account disabling unit is used for receiving a disabling request which is sent by a user through the enterprise browser and aims at a target login account in the disabled account information list; and according to the forbidding request, obtaining a forbidding strategy which is issued by the background server and corresponds to the forbidding request, and forbidding the target management and control behavior on the target login account based on the forbidding strategy.
9. An electronic device, comprising:
a processor; and
a memory, configured to store a program of an enterprise browser based behavior control method, where after the electronic device is powered on and runs the program of the enterprise browser based behavior control method through the processor, the electronic device executes the enterprise browser based behavior control method according to any one of claims 1 to 6.
10. A computer readable storage medium containing one or more program instructions for execution by a server of the enterprise browser-based behavior governance method of any one of claims 1-6.
CN201910907358.5A 2019-09-24 2019-09-24 Behavior control method and device based on enterprise browser Pending CN110765428A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910907358.5A CN110765428A (en) 2019-09-24 2019-09-24 Behavior control method and device based on enterprise browser

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910907358.5A CN110765428A (en) 2019-09-24 2019-09-24 Behavior control method and device based on enterprise browser

Publications (1)

Publication Number Publication Date
CN110765428A true CN110765428A (en) 2020-02-07

Family

ID=69329985

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910907358.5A Pending CN110765428A (en) 2019-09-24 2019-09-24 Behavior control method and device based on enterprise browser

Country Status (1)

Country Link
CN (1) CN110765428A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111773714A (en) * 2020-07-09 2020-10-16 网易(杭州)网络有限公司 Game skill configuration method and device and game skill control method and device
CN112685682A (en) * 2021-03-16 2021-04-20 连连(杭州)信息技术有限公司 Method, device, equipment and medium for identifying forbidden object of attack event
CN112769806A (en) * 2020-12-31 2021-05-07 北京明朝万达科技股份有限公司 Operation behavior control method and device on terminal equipment and electronic equipment
CN113778506A (en) * 2021-07-23 2021-12-10 北京国电通网络技术有限公司 Browser control method, system and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599116A (en) * 2008-06-02 2009-12-09 中兴通讯股份有限公司 A kind of method of controlling user to access pages
CN105631359A (en) * 2015-12-23 2016-06-01 北京奇虎科技有限公司 Control method and device of webpage operation
CN105631355A (en) * 2015-12-18 2016-06-01 北京奇虎科技有限公司 Data processing method and device
CN108920946A (en) * 2018-07-30 2018-11-30 美通云动(北京)科技有限公司 Data security control method and device based on browser

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599116A (en) * 2008-06-02 2009-12-09 中兴通讯股份有限公司 A kind of method of controlling user to access pages
CN105631355A (en) * 2015-12-18 2016-06-01 北京奇虎科技有限公司 Data processing method and device
CN105631359A (en) * 2015-12-23 2016-06-01 北京奇虎科技有限公司 Control method and device of webpage operation
CN108920946A (en) * 2018-07-30 2018-11-30 美通云动(北京)科技有限公司 Data security control method and device based on browser

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谭亮: "《基于大数据的高职院校人事管理》", 31 October 2018 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111773714A (en) * 2020-07-09 2020-10-16 网易(杭州)网络有限公司 Game skill configuration method and device and game skill control method and device
CN112769806A (en) * 2020-12-31 2021-05-07 北京明朝万达科技股份有限公司 Operation behavior control method and device on terminal equipment and electronic equipment
CN112769806B (en) * 2020-12-31 2023-06-23 北京明朝万达科技股份有限公司 Method and device for controlling operation behaviors on terminal equipment and electronic equipment
CN112685682A (en) * 2021-03-16 2021-04-20 连连(杭州)信息技术有限公司 Method, device, equipment and medium for identifying forbidden object of attack event
CN112685682B (en) * 2021-03-16 2021-07-09 连连(杭州)信息技术有限公司 Method, device, equipment and medium for identifying forbidden object of attack event
CN113778506A (en) * 2021-07-23 2021-12-10 北京国电通网络技术有限公司 Browser control method, system and device and electronic equipment
CN113778506B (en) * 2021-07-23 2024-05-10 北京国电通网络技术有限公司 Browser management and control method, system and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN110765428A (en) Behavior control method and device based on enterprise browser
US10848520B2 (en) Managing access to resources
DE102009013384B4 (en) System and method for providing a secure application fragmentation environment
CN106330958B (en) Secure access method and device
CN111181975B (en) Account management method, device, equipment and storage medium
WO2016034948A1 (en) Secure document sharing
CA2623141A1 (en) Content cryptographic firewall system
CN103826215A (en) Method and apparatus for carrying out root authority management at terminal equipment
CN107480554B (en) Authority management method, authority management device and intelligent terminal
DE102016123744A1 (en) Single-chip system with access control unit and mobile device with single-chip system
GB2599273A (en) Fine-grained token based access control
DE112011105696T5 (en) BIOS access management
CN110837648A (en) Document processing method, device and equipment
CN110839014B (en) Authentication method, authentication device, computer equipment and readable storage medium
US9104353B2 (en) Printing of confidential documents
US10650153B2 (en) Electronic document access validation
US10210337B2 (en) Information rights management using discrete data containerization
WO2018063947A1 (en) Generating short-term signatures for accessing cloud storage
US10721236B1 (en) Method, apparatus and computer program product for providing security via user clustering
CN105574380A (en) Application authority management method and device for terminal
CN111447178B (en) Access control method, system and computing device
CN106982428B (en) Security configuration method, security control device and security configuration device
CA2959574C (en) Access control system and access control method
Lovat et al. Data-centric multi-layer usage control enforcement: A social network example
WO2021147652A1 (en) Permission management method, and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200207

RJ01 Rejection of invention patent application after publication