CN114363001A - Method, system and storage medium for client access limitation based on offline configuration - Google Patents

Method, system and storage medium for client access limitation based on offline configuration Download PDF

Info

Publication number
CN114363001A
CN114363001A CN202111477370.0A CN202111477370A CN114363001A CN 114363001 A CN114363001 A CN 114363001A CN 202111477370 A CN202111477370 A CN 202111477370A CN 114363001 A CN114363001 A CN 114363001A
Authority
CN
China
Prior art keywords
client
server
white list
debugged
hardware identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111477370.0A
Other languages
Chinese (zh)
Inventor
穆云龙
张行
许尧
许旵鹏
臧伟
蒋晶晶
余勇
霍骋
刘显祖
李骆
马洪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Super High Voltage Branch Of State Grid Anhui Electric Power Co ltd
State Grid Corp of China SGCC
Original Assignee
Super High Voltage Branch Of State Grid Anhui Electric Power Co ltd
State Grid Corp of China SGCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Super High Voltage Branch Of State Grid Anhui Electric Power Co ltd, State Grid Corp of China SGCC filed Critical Super High Voltage Branch Of State Grid Anhui Electric Power Co ltd
Priority to CN202111477370.0A priority Critical patent/CN114363001A/en
Publication of CN114363001A publication Critical patent/CN114363001A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the invention provides a method, a system and a storage medium for client access restriction based on offline configuration, and belongs to the technical field of computers. The method comprises the following steps: matching a server side and a client side; authenticating the client according to the server and checking safety information; transmitting and configuring an IP1 white list accessible to the client according to the server network; and configuring a list of authorized hardware identification devices according to the server. Through the technical scheme, the method, the system and the storage medium for limiting the client access based on the off-line configuration, which are provided by the invention, can debug the debugged equipment through the client by virtue of the IP1 white list for limiting the access of the debugged client, and can not trigger the alarm of an internal security system of an enterprise in the debugging process, thereby saving the debugging time and maintaining the information security of the debugged equipment.

Description

Method, system and storage medium for client access limitation based on offline configuration
Technical Field
The invention relates to the technical field of computers, in particular to a method, a system and a storage medium for client access limitation based on offline configuration.
Background
The definition of information security ISO is: technical, administrative security protections are established and employed for data processing systems in order to protect computer hardware, software, data from being corrupted, altered, and revealed for casual and malicious reasons. In recent years, as the frequency of information leakage events is continuously increased, once information is leaked, huge losses are caused to governments and enterprises.
In the prior art, when the equipment of an enterprise needs to be debugged, internal personnel of the enterprise are generally required to check and authorize the debugged computer, otherwise, the alarm of the internal security system of the enterprise is triggered, a large amount of debugging time is wasted by the flow of the check and authorization, and one computer can only debug one equipment, which greatly wastes material resources.
Disclosure of Invention
The embodiment of the invention aims to provide a method, a system and a storage medium for limiting client access based on offline configuration, wherein the method, the system and the storage medium for limiting client access based on offline configuration can improve debugging efficiency by enabling a client to access an IP (Internet protocol) of a server.
In order to achieve the above object, an aspect of the embodiments of the present invention provides a method for defining client access based on offline configuration, including:
matching a server side and a client side;
authenticating the client according to the server and checking safety information;
transmitting and configuring an IP1 white list accessible to the client according to the server network;
configuring a list of authorized hardware identification devices according to the server;
disconnecting the server;
judging whether the IP1 white list has the IP address of the debugged equipment;
when the IP1 white list is judged to have the IP address of the debugged equipment, the client can be connected with the debugged equipment and debugged;
when the IP1 white list does not have the IP address of the debuggee device, the client cannot connect to the debuggee device and debug the debuggee device.
Optionally, the method further comprises:
generating a configuration file of the client according to the server;
transmitting the configuration file to the authorized hardware identification device;
and matching the authorized hardware identification device with the client, and reading the configuration file and updating the configuration file to the IP1 white list by the client.
Optionally, the configuration file includes a white list of IP2 and a list of new authorized hardware identification devices.
In another aspect, the present invention further provides a system for client access restriction based on offline configuration, where the system includes:
the client is used for connecting with the IP address of the debugged equipment;
the hardware identification device is used for storing and transmitting the IP white list of the client;
and the server is used for managing and recording the information of all the clients, and the information comprises an IP white list of each client and a list of authorized hardware identification devices.
Optionally, the hardware identification device includes a usb disk.
Optionally, the client, the hardware identification device, and the server are configured to:
matching a server side and a client side;
authenticating the client according to the server and checking safety information;
transmitting and configuring an IP1 white list accessible to the client according to the server network;
configuring a list of authorized hardware identification devices according to the server;
disconnecting the server, and judging whether the IP1 white list has the IP address of the debugged equipment;
when the IP1 white list is judged to have the IP address of the debugged equipment, the client can be connected with the debugged equipment and debugged;
when the IP1 white list does not have the IP address of the debuggee device, the client cannot connect to the debuggee device and debug the debuggee device.
Optionally, the client, the hardware identification device, and the server are configured to:
generating a configuration file of the client according to the server;
transmitting the configuration file to the authorized hardware identification device;
and matching the authorized hardware identification device with the client, and reading the configuration file and updating the configuration file to the IP1 white list by the client.
Optionally, the configuration file includes a white list of IP2 and a list of new authorized hardware identification devices.
In yet another aspect, the invention also provides a computer readable storage medium having stored thereon instructions for reading by a machine to cause the machine to perform a method as described in any one of the above.
Through the technical scheme, the method, the system and the storage medium for limiting the client access based on the off-line configuration, which are provided by the invention, can debug the debugged equipment through the client by virtue of the IP1 white list for limiting the access of the debugged client, and can not trigger the alarm of an internal security system of an enterprise in the debugging process, thereby saving the debugging time and maintaining the information security of the debugged equipment.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the embodiments of the invention without limiting the embodiments of the invention. In the drawings:
FIG. 1 is a flow diagram of a method for client access qualification based on offline configuration according to one embodiment of the present invention;
FIG. 2 is a flow diagram of a method for client access qualification based on offline configuration according to one embodiment of the present invention;
fig. 3 is a schematic structural diagram of a system for client access restriction based on offline configuration according to an embodiment of the present invention.
Description of the reference numerals
01. Server 02 and hardware identification device
03. Client terminal
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating embodiments of the invention, are given by way of illustration and explanation only, not limitation.
FIG. 1 is a flow diagram of a method for client access qualification based on offline configuration according to one embodiment of the present invention. In fig. 1, the method may include:
in step S10, the server and the client are matched. Before the debugging permission of the client to the equipment needs to be opened, the client and the server need to be connected.
In step S11, the client is authenticated by the server and security information is checked. After the server is connected with the client, the server needs to authenticate the client, and authenticate whether the client has a function of debugging debugged equipment. The server side synchronously checks the safety information of the client side so as to avoid potential safety hazards influencing the debugging permission of the server side/the client side in the client side.
In step S12, an IP1 white list accessible to the client is transmitted and configured according to the server network. The server configures an IP1 white list accessible by the client according to actual equipment debugging requirements, and transmits the IP1 white list to the client so that the client can debug the equipment needing debugging according to the IP1 white list. Specifically, the IP1 white list is the debugging permission of the client.
In step S13, a list of authorized hardware identification devices is configured according to the server. The server configures a list of hardware identification devices capable of being connected with the client, namely a list of authorized hardware identification devices, according to actual requirements, so that the client can conveniently connect and read contents in the authorized hardware identification devices, and debugging of the debugged equipment by the client is facilitated.
In step S14, the server is disconnected. After the server transmits the IP1 white list to the client and is read by the client, the server is disconnected, so as to prevent the client from not triggering an alarm of the internal security system of the enterprise in the process of debugging the debugged device.
In step S15, it is determined whether there is an IP address of the debuggee device in the IP1 white list. After the server is disconnected, it needs to determine whether the IP1 white list has the IP address of the debugged device, so as to determine that the client can debug the debugged device.
In step S16, when it is determined that the IP address of the debuggee device exists in the IP1 white list, the client may connect to the debuggee device and debug the debuggee device. If the IP1 white list includes the IP address of the debugged device, it indicates that the client has the debugging permission of the debugged device, that is, the client may connect to and debug the debugged device.
In step S17, when it is determined that the IP address of the debuggee device does not exist in the IP1 white list, the client cannot connect to and debug the debuggee device. If the IP1 white list does not have the IP address of the debugged device, it indicates that the client does not have the debugging permission of the debugged device, that is, the client cannot connect to and debug the debugged device.
In steps S10 to S17, the server needs to connect to the client, and authenticate the client and check the security information. The service side configures and transmits an IP1 white list which can be accessed by the client side through the network, and the debugging authority of the equipment to be debugged in the IP1 white list. If the IP address of the debuggee device exists in the IP1 white list, the client may connect to the debuggee device and perform debugging operation on the debuggee device, otherwise, the client may not perform debugging operation on the debuggee device.
In the prior art, when the equipment of an enterprise is debugged, internal personnel of the enterprise are generally required to inspect and authorize the debugged computer, otherwise, the alarm of an internal security system of the enterprise is triggered, but a large amount of debugging time is wasted by the process of the inspection and the authorization, and one computer can only debug one equipment, which greatly wastes material resources. In this embodiment of the present invention, in a manner that the server network configures and transmits the IP1 white list accessible to the client, the client can connect the corresponding debuggee device according to the IP address of the connectable debuggee device on the IP1 white list, so as to achieve the purpose that the client connects multiple debuggee devices. Meanwhile, in the state that the server is disconnected, the client can connect and debug the debugged equipment on the IP1 white list under the condition that the alarm of the safety system inside the enterprise is not triggered, so that the debugging time is saved, and the information safety of the debugging equipment is maintained.
In this embodiment of the present invention, in order that the client can also connect to the debuggee device in the server offline state, a hardware identification device is further required to store the accessible IP address of the debuggee device.
In particular, the method may also have the steps shown in fig. 2. In fig. 2, the method may further include:
in step S20, a configuration file of the client is generated from the server. The server needs to generate a configuration file in an offline state, where the configuration file may include an IP address of the debugged device that can be read by the client.
In step S21, the configuration file is transmitted to an authorized hardware identification device. After the server generates the configuration file in the offline state, the authorized hardware identification device that can be read by the client is required to store the configuration file, and therefore the configuration file is transmitted to the authorized hardware identification device.
In step S22, the authorized hardware identification device and the client are matched, and the client reads the configuration file and updates the configuration file to the IP1 white list. In the offline state of the server, the authorized hardware identification device is connected with the corresponding client, so that the client can read the configuration file in the authorized hardware identification device and update the IP address of the debugged equipment in the configuration file to the IP1 white list on the client to form a new IP white list.
In steps S20 to S22, the server generates a configuration file and stores the configuration file through an authorized hardware identification device. In the offline state of the server, the authorized hardware identification device is connected with the corresponding server, so that the server reads and configures the IP address of the debugged equipment in the file and updates the IP address to the IP1 white list, and further, the client can debug the debugged equipment in the new IP white list in the offline state of the server, and the debugging efficiency is improved.
In this embodiment of the invention, the configuration file may include a white list of IP2 and a list of new authorized hardware identification devices. Specifically, the IP2 white list is an IP address of a debuggee device accessible by the client in the offline state of the server; the list of new authorized hardware identification devices is a list that can be connected by the client and read the authorized hardware identification devices, so as to avoid unnecessary potential safety hazard or alarm generated when the client is connected with other unauthorized hardware identification devices.
In another aspect, the present invention further provides a system for client access restriction based on offline configuration, and in particular, the system may be as shown in fig. 3. In fig. 3, the system may include a client 03, a hardware recognition device 02, and a server 01.
The client 03 is used for connecting with the IP address of the debuggee device; the hardware identification device 02 is used for storing and transmitting an IP white list of the client 03; the server 01 is used to manage and record information of all the clients 03, which may include an IP white list of each client and a list of authorized hardware identification devices 02.
When the server 01 operates normally, the server 01 may configure and transmit the IP white list of the debugged device to the client 03 through the network, so as to achieve the purpose that the client 03 connects multiple debugged devices. Meanwhile, in the state that the server 01 is disconnected, the client 03 can connect and debug the debugged device on the IP white list without triggering an alarm of the internal security system of the enterprise, so that the debugging time is saved, and the information security of the debugging device is maintained. When the server 01 is offline, the client 03 can read and update the IP address of the debugged device from the authorized hardware identification device 02, so that the client 03 can connect and access the updated IP address of the debugged device in the offline state of the server 01, and the debugging efficiency of the client 03 on the debugged device is improved.
In this embodiment of the present invention, the specific structure of the hardware identification device 02 may be in various forms known to those skilled in the art, such as a hard disk, a usb disk, and the like. In a preferred example of the present invention, however, the hardware recognition device 02 may be a usb disk in consideration of portability and convenience of use of the hardware recognition device 02.
In this embodiment of the present invention, the client 03, the hardware recognition device 02 and the server 01 are configured to execute the following methods:
step one, a server 01 and a client 03 are matched. Before the debugging permission of the client 03 to the device needs to be opened, the client 03 and the server 01 need to be connected.
And step two, authenticating the client 03 according to the server 01, and checking safety information. After the server 01 and the client 03 are connected, the server 01 needs to authenticate the client 03, and authenticate whether the client 03 has a function of debugging debugged equipment. The server 01 synchronously checks the security information of the client 03 so as to avoid potential safety hazards influencing the debugging permission of the server 01/the client 03 in the client 03.
And step three, transmitting and configuring an IP1 white list accessible by the client 03 according to the network of the server 01. The server 01 configures an IP1 white list accessible by the client 03 according to actual device debugging requirements, and transmits an IP1 white list to the client 03 so that the client 03 can debug the device needing debugging according to the IP1 white list. Specifically, the IP1 white list is the debugging permission of the client 03.
And step four, configuring a list of authorized hardware identification devices 02 according to the server 01. The server 01 configures a list of the hardware identification devices 02 capable of being connected to the client 03, that is, a list of authorized hardware identification devices 02, according to actual requirements, so that the client 03 can conveniently connect and read contents in the authorized hardware identification devices 02, and debugging of debugged equipment by the client is facilitated.
And step five, disconnecting the server 01. After the server 01 transmits the IP1 white list to the client 03 and is read by the client 03, the server 01 is disconnected, so that the client 03 is prevented from not triggering an alarm of the internal security system of the enterprise in the process of debugging the debugged device.
And step six, judging whether the IP1 white list has the IP address of the debugged equipment. After the server 01 is disconnected, it needs to determine whether the IP1 white list has an IP address of the debugged device, so as to determine that the client 03 can debug the debugged device.
Step seven, when the IP address of the debugged device exists in the IP1 white list, the client 03 may connect to the debugged device and debug the debugged device. If the IP1 white list includes the IP address of the debugged device, it indicates that the client 03 has the debugging permission of the debugged device, that is, the client 03 may connect to and debug the debugged device.
Step eight, when it is determined that the IP address of the debugged device does not exist in the IP1 white list, the client 03 cannot connect to the debugged device and debugged the debugged device. If the IP1 white list does not have the IP address of the debugged device, it indicates that the client 03 does not have the debugging permission of the debugged device, that is, the client 03 cannot connect to and debug the debugged device.
In the first to eighth steps, the server 01 needs to connect to the client 03, and perform authentication and security information check on the client 03. The server 01 configures and transmits an IP1 white list accessible to the client 03 through the network, and the debugging permission of the equipment to be debugged in the IP1 white list. If the IP address of the debuggee device exists in the IP1 white list, the client 03 may connect to the debuggee device and perform the debugging operation on the debuggee device, otherwise, the debugging operation cannot be performed on the debuggee device.
In this embodiment of the present invention, the client 03, the hardware recognition device 02 and the server 01 are configured to execute the following methods:
and step nine, generating a configuration file of the client 03 according to the server 01. The server 01 needs to generate a configuration file in an offline state, where the configuration file may include an IP address of the debugged device that can be read by the client 03.
Step ten, transmitting the configuration file to the authorized hardware identification device 02. However, after the server 01 generates the configuration file in the offline state, the authorized hardware identification device 02 that can be read by the client 03 is required to store the configuration file, and therefore the configuration file is transmitted to the authorized hardware identification device 02.
Step eleven, matching the authorized hardware identification device 02 with the client 03, and reading the configuration file and updating the configuration file to the IP1 white list by the client 03. In the state that the server 01 is offline, the authorized hardware identification device 02 is connected with the corresponding client 03, so that the client 03 can read the configuration file in the authorized hardware identification device 02, and update the IP address of the debugged device in the configuration file to the IP1 white list on the client 03 to form a new IP white list.
In the ninth step to the eleventh step, the server 01 generates a configuration file, and stores the configuration file through the authorized hardware identification device 02. In the offline state of the server 01, the authorized hardware identification device 02 is connected with the corresponding server 01, so that the server 01 reads and configures the IP address of the debugged device in the file and updates the IP address to the IP1 white list, and further, the client 03 can debug the debugged device in the new IP white list in the offline state of the server 01, and the debugging efficiency is improved.
In this embodiment of the invention, the configuration file may include a white list of IP2 and a list of new authorized hardware identification devices 02. Specifically, the IP2 white list is an IP address of a debuggee device accessible to the client 03 in the offline state of the server 01; the list of the new authorized hardware identification devices 02 is a list that can be connected by the client 03 and read the authorized hardware identification devices 02, so as to prevent the client 03 from connecting other unauthorized hardware identification devices 02 and generating unnecessary safety hazards or giving an alarm.
In yet another aspect, the invention also provides a computer-readable storage medium that may store instructions for reading by a machine to cause the machine to perform a method as any one of the above.
Through the technical scheme, the method, the system and the storage medium for limiting the client access based on the offline configuration, which are provided by the invention, have the advantages that the debugged equipment can be debugged through the client 03 through the IP1 white list for limiting the access of the debugged client 03, the alarm of an internal security system of an enterprise can not be triggered in the debugging process, the debugging time is saved, and the information security of the debugged equipment is maintained.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (9)

1. A method for client access restriction based on offline configuration, comprising:
matching a server side and a client side;
authenticating the client according to the server and checking safety information;
transmitting and configuring an IP1 white list accessible to the client according to the server network;
configuring a list of authorized hardware identification devices according to the server;
disconnecting the server;
judging whether the IP1 white list has the IP address of the debugged equipment;
when the IP1 white list is judged to have the IP address of the debugged equipment, the client can be connected with the debugged equipment and debugged;
when the IP1 white list does not have the IP address of the debuggee device, the client cannot connect to the debuggee device and debug the debuggee device.
2. The method of claim 1, further comprising:
generating a configuration file of the client according to the server;
transmitting the configuration file to the authorized hardware identification device;
and matching the authorized hardware identification device with the client, and reading the configuration file and updating the configuration file to the IP1 white list by the client.
3. The method of claim 2, wherein the configuration file comprises a white list of IP2 and a list of new authorized hardware identification devices.
4. A system for client access restriction based on offline configuration, the system comprising:
a client (03) for connecting with an IP address of a debuggee device;
hardware identification means (02) for storing and transmitting an IP whitelist of said client (03);
and the server (01) is used for managing and recording information of all the clients (03), wherein the information comprises an IP white list of each client and a list of authorized hardware identification devices (02).
5. System according to claim 4, characterized in that the hardware identification means (02) comprise a USB flash disk.
6. The system according to claim 4, characterized in that the client (03), the hardware recognition device (02) and the server (01) are configured to:
matching a server (01) and a client (03);
authenticating the client (03) according to the server (01), and checking safety information;
transmitting and configuring an IP1 white list accessible to the client (03) according to the server (01) network;
configuring a list of authorized hardware identification devices (02) according to the server (01);
disconnecting the server (01), and judging whether the IP1 white list has the IP address of the debugged equipment;
when the IP1 white list is judged to have the IP address of the debugged equipment, the client (03) can be connected with the debugged equipment and debugged;
and when the IP1 white list does not have the IP address of the debugged device, the client (03) cannot be connected with the debugged device and debugged.
7. The system according to claim 6, characterized in that the client (03), the hardware recognition device (02) and the server (01) are configured to:
generating a configuration file of the client (03) according to the server (01);
-transmitting said configuration file to said authorized hardware identification device (02);
matching the authorized hardware identification device (02) with the client (03), the client (03) reading the configuration file and updating to the IP1 white list.
8. The system according to claim 7, characterized in that the configuration file comprises a white list of IP2 and a list of new authorized hardware identification means (02).
9. A computer-readable storage medium having stored thereon instructions for reading by a machine to cause the machine to perform the method of any of claims 1 to 3.
CN202111477370.0A 2021-12-06 2021-12-06 Method, system and storage medium for client access limitation based on offline configuration Pending CN114363001A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111477370.0A CN114363001A (en) 2021-12-06 2021-12-06 Method, system and storage medium for client access limitation based on offline configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111477370.0A CN114363001A (en) 2021-12-06 2021-12-06 Method, system and storage medium for client access limitation based on offline configuration

Publications (1)

Publication Number Publication Date
CN114363001A true CN114363001A (en) 2022-04-15

Family

ID=81097189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111477370.0A Pending CN114363001A (en) 2021-12-06 2021-12-06 Method, system and storage medium for client access limitation based on offline configuration

Country Status (1)

Country Link
CN (1) CN114363001A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072108A (en) * 2007-07-17 2007-11-14 杭州华三通信技术有限公司 SSL VPN client end safety inspection method, system and device
CN105763554A (en) * 2016-03-28 2016-07-13 努比亚技术有限公司 Network detection method, client, and network detection system
CN105871649A (en) * 2016-06-21 2016-08-17 上海帝联信息科技股份有限公司 Node server, service side and configuration file updating method thereof and updating control method
CN106250476A (en) * 2016-07-29 2016-12-21 努比亚技术有限公司 A kind of methods, devices and systems updated and synchronize white list
CN106331049A (en) * 2015-07-03 2017-01-11 阿里巴巴集团控股有限公司 Resource caching method, cache resource updating method, client, server and system
CN108121559A (en) * 2017-12-29 2018-06-05 重庆金融资产交易所有限责任公司 Configuration file method for pushing, server and storage medium
CN109861982A (en) * 2018-12-29 2019-06-07 北京奇安信科技有限公司 A kind of implementation method and device of authentication
CN110008697A (en) * 2019-03-31 2019-07-12 深圳联想懂的通信有限公司 A kind of equipment and its intelligent white list management method
CN111107083A (en) * 2019-12-18 2020-05-05 杭州迪普科技股份有限公司 White list specification testing method and device
CN112003976A (en) * 2020-07-31 2020-11-27 北京达佳互联信息技术有限公司 Hard-coding and hard-decoding test method and device
CN112838980A (en) * 2020-12-30 2021-05-25 北京奇艺世纪科技有限公司 Message processing method, system, device, electronic equipment and storage medium
CN113162975A (en) * 2021-03-04 2021-07-23 西安电子科技大学 Shared mobile terminal file offline downloading system, method, storage medium and equipment
CN113179271A (en) * 2021-04-28 2021-07-27 深圳前海微众银行股份有限公司 Intranet security policy detection method and device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072108A (en) * 2007-07-17 2007-11-14 杭州华三通信技术有限公司 SSL VPN client end safety inspection method, system and device
CN106331049A (en) * 2015-07-03 2017-01-11 阿里巴巴集团控股有限公司 Resource caching method, cache resource updating method, client, server and system
CN105763554A (en) * 2016-03-28 2016-07-13 努比亚技术有限公司 Network detection method, client, and network detection system
CN105871649A (en) * 2016-06-21 2016-08-17 上海帝联信息科技股份有限公司 Node server, service side and configuration file updating method thereof and updating control method
CN106250476A (en) * 2016-07-29 2016-12-21 努比亚技术有限公司 A kind of methods, devices and systems updated and synchronize white list
CN108121559A (en) * 2017-12-29 2018-06-05 重庆金融资产交易所有限责任公司 Configuration file method for pushing, server and storage medium
CN109861982A (en) * 2018-12-29 2019-06-07 北京奇安信科技有限公司 A kind of implementation method and device of authentication
CN110008697A (en) * 2019-03-31 2019-07-12 深圳联想懂的通信有限公司 A kind of equipment and its intelligent white list management method
CN111107083A (en) * 2019-12-18 2020-05-05 杭州迪普科技股份有限公司 White list specification testing method and device
CN112003976A (en) * 2020-07-31 2020-11-27 北京达佳互联信息技术有限公司 Hard-coding and hard-decoding test method and device
CN112838980A (en) * 2020-12-30 2021-05-25 北京奇艺世纪科技有限公司 Message processing method, system, device, electronic equipment and storage medium
CN113162975A (en) * 2021-03-04 2021-07-23 西安电子科技大学 Shared mobile terminal file offline downloading system, method, storage medium and equipment
CN113179271A (en) * 2021-04-28 2021-07-27 深圳前海微众银行股份有限公司 Intranet security policy detection method and device

Similar Documents

Publication Publication Date Title
CN112217835B (en) Message data processing method and device, server and terminal equipment
CN110889130B (en) Database-based fine-grained data encryption method, system and device
CN104991526B (en) Industrial control system safety supports framework and its Security Data Transmission and storage method
CN104468632A (en) Loophole attack prevention method, device and system
CN103095720B (en) A kind of method for managing security of cloud storage system of dialogue-based management server
CN112818328A (en) Multi-system authority management method, device, equipment and storage medium
KR101414580B1 (en) A Secured Linux Operationg System Using Multi-level Security
CN103500202A (en) Security protection method and system for light-weight database
CN111131303A (en) Request data verification system and method
CN109936555A (en) A kind of date storage method based on cloud platform, apparatus and system
Mahmood et al. Systematic threat assessment and security testing of automotive over-the-air (OTA) updates
CN115701019A (en) Access request processing method and device of zero trust network and electronic equipment
CN115310084A (en) Tamper-proof data protection method and system
CN115189946A (en) Cross-network data exchange system and data exchange method
Ivanov et al. Ethclipper: a clipboard meddling attack on hardware wallets with address verification evasion
US9432357B2 (en) Computer network security management system and method
CN112422527B (en) Threat assessment system, method and device for substation power monitoring system
US10158623B2 (en) Data theft deterrence
US20220060463A1 (en) Method for managing network devices, apparatus, and computer readable storage medium
CN110086812B (en) Safe and controllable internal network safety patrol system and method
CN114363001A (en) Method, system and storage medium for client access limitation based on offline configuration
CN115941743A (en) Method and system for identity authentication and data backup
US11770363B2 (en) Systems and methods for secure access smart hub for cyber-physical systems
CN115114657A (en) Data protection method, electronic device and computer storage medium
CN108134781B (en) Important information data secrecy monitoring system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination