CN115021951A - Service application management method and system - Google Patents
Service application management method and system Download PDFInfo
- Publication number
- CN115021951A CN115021951A CN202210384470.7A CN202210384470A CN115021951A CN 115021951 A CN115021951 A CN 115021951A CN 202210384470 A CN202210384470 A CN 202210384470A CN 115021951 A CN115021951 A CN 115021951A
- Authority
- CN
- China
- Prior art keywords
- business
- application
- service
- business application
- service application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 69
- 238000000034 method Methods 0.000 claims abstract description 22
- 206010000117 Abnormal behaviour Diseases 0.000 claims description 8
- 238000012795 verification Methods 0.000 claims description 8
- 238000007689 inspection Methods 0.000 claims 4
- 238000013475 authorization Methods 0.000 abstract description 9
- 238000004891 communication Methods 0.000 abstract description 6
- 210000001503 joint Anatomy 0.000 abstract description 4
- 238000012423 maintenance Methods 0.000 abstract description 4
- 238000011161 development Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a business application management method and a system, wherein the method comprises the steps of receiving importance levels and function categories of business applications to be put on shelf; searching a service application management library according to the importance level and the function category to obtain a service specification of the service application to be put on shelf; after the business application is put on shelf, configuring the business application according to the business specification; and sending the configured service application to the client. The method has the following advantages: before the business application is put on shelf, the system can assist enterprises to make standard business specifications according to importance levels and function categories, so that all departments can perform flow control according to the unified business specifications, and the communication cost among all the departments is reduced. The service application is managed by the same system platform, so that the service, safety and authorization integrated full-flow management is realized, a plurality of system platforms do not need to be connected in a butt joint mode, and the management operation and maintenance efficiency is improved.
Description
Technical Field
The invention belongs to the technical field of application security, and particularly relates to a service application management method and system.
Background
In the era of rapid development of mobile services, the safety standard management of service applications in enterprises is very important. At present, service application development, application security management and security audit in the service process of most enterprises belong to personnel management of different departments, and the used systems are different. The service development department mainly focuses on the functionality of the service, has low attention on the safety compliance of service application, and only hopes that the service is rapidly put on shelf for popularization and use. The application management department only cares about release and popularization of the application, management of application authority, access control and identity authentication, and does not care about security risks faced by the application. The security audit department mainly focuses on the aspects of terminal security, mobile security, boundary security, operation and maintenance security, data security and the like.
Due to the diversity and complexity of the business, most of the interior of the enterprise lacks a uniform business application management standard, and because the focus of attention is different, each department has a contradiction point, and the communication cost is high. Meanwhile, because each department uses different systems, the butt joint is difficult, and the rapid and safe shelving popularization of business application is not facilitated.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a service application management method and a service application management system, which unify the service application management standard and reduce the communication cost among all departments.
In a first aspect, a method for managing a service application includes:
receiving the importance level and the function category of the service application to be put on shelf;
searching a service application management library according to the importance level and the function category to obtain a service specification of the service application to be put on shelf;
after the business application is put on shelf, the business application is configured according to the business specification;
and sending the configured service application to the client.
Preferably, the service application management library is constructed by the following method:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring application level security policies of the business applications with different importance levels and different function classes.
Preferably, the device-level security check policy and the trust scoring rule respectively correspond to at least one of the following security check items:
context awareness, identity verification, and abnormal behavior.
Preferably, the rights include:
access rights, functional rights and data rights of the business application.
Preferably, the service application is further configured to receive a trust score of the client, and adjust the user access right according to the trust score.
In a second aspect, a business application management system includes:
a management platform: the system comprises a business application management library, a business application management library and a business application management module, wherein the business application management library is used for receiving the importance level and the function type of the business application to be shelved and searching the business application management library according to the importance level and the function type to obtain the business specification of the business application to be shelved; the management platform is also used for configuring the service application according to the service specification after the service application is put on shelf and sending the configured service application to the client;
a client: for running business applications.
Preferably, the service application management library is constructed by the following method:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring the application level security policies of the business applications with different importance levels and different function classes.
Preferably, the device-level security check policy and the trust scoring rule respectively correspond to at least one of the following security check items:
context awareness, identity verification, and abnormal behavior.
Preferably, the rights include:
access rights, functional rights and data rights of the service application.
Preferably, the service application is further configured to receive a trust score of the client, and adjust the user access right according to the trust score.
According to the technical scheme, the service application management method and the service application management system provided by the invention have the following advantages:
1) before the business application is put on shelf, the system can assist enterprises to make standard business specifications according to importance levels and function categories, so that all departments can perform flow control according to the unified business specifications, and the communication cost among all the departments is reduced.
2) The service application is managed by the same system platform, so that the service, safety and authorization integrated full-flow management is realized, a plurality of system platforms do not need to be connected in a butt joint mode, and the management operation and maintenance efficiency is improved.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a flowchart of a service application management method according to an embodiment.
Fig. 2 is a flowchart of a method for setting and configuring a service specification according to an embodiment.
Fig. 3 is a flowchart of a method for running a service application according to an embodiment.
Fig. 4 is a block diagram of a business application management system according to an embodiment.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby. It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Example (b):
a business application management method, see fig. 1, comprising:
s1: receiving the importance level and the function category of the service application to be put on shelf;
s2: searching a service application management library according to the importance level and the function category to obtain a service specification of the service application to be put on shelf;
s3: after the business application is put on shelf, the business application is configured according to the business specification;
s4: and sending the configured service application to the client.
In a traditional business application management method, when a new business application needs to be put on shelf, each department of an enterprise needs to configure information such as operation authority, access authority, security policy and the like of the business application. Generally, business applications of the same type, the same enterprise, or the same industry are managed by using the same set of rules, so for the business applications managed by using the same set of rules, many configuration operations at the front end of the business applications are repeated, and different information has a certain correlation, for example, the access rights of the business applications of the same importance level are the same. Therefore, the method associates the service specifications with the importance levels and the function types respectively, and automatically generates the corresponding service specifications after the importance levels and the function types of the service application are determined, thereby reducing the communication cost of each department.
In this embodiment, the importance levels of the business applications of the same type, the same enterprise, or the same industry may include multiple levels, for example, the importance levels may be divided into 5 levels: A1-A5. The importance level also supports customization, e.g., can be customized to general, important, core, etc. The functional categories of the business application can comprise a plurality of categories and also support customization, for example, the functional categories can be mobile office, mobile exhibition industry and the like. Business applications under the same functional class may have multiple levels of importance, or business applications under the same level of importance may have multiple functional classes. The service application management library stores a plurality of service specifications, and each service specification corresponds to a function class and an importance level. According to the method, after the application store shelves the service application, the application store can perform clustering display on the service application according to the function category and the importance level.
In this embodiment, before the business application is put on shelf, the method may be implemented by entering, by an enterprise-related person, an importance level and a function category of the business application, then searching for a corresponding business specification according to the importance level and the function category, after the business application is put on shelf, uniformly configuring the business application according to the business specification, and after the configuration is completed, issuing the business application to the client for use.
The service application management method has the following advantages:
1) before business application is put on shelf, enterprises can be assisted to make standard business specifications according to importance levels and function categories, so that all departments can perform flow control according to the unified business specifications, and communication cost among all the departments is reduced.
2) The service application is managed by the same system platform, so that the service, safety and authorization integrated full-flow management is realized, a plurality of system platforms do not need to be connected in a butt joint mode, and the management operation and maintenance efficiency is improved.
Further, in some embodiments, referring to fig. 2, the business application management library is constructed by:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring the application level security policies of the business applications with different importance levels and different function classes.
In this embodiment, the service application access subject is an object for using the service application, and mainly includes a client. The method can configure different equipment level security check strategies and trust scoring rules for different business application access subjects on the premise of determining the importance level and the function category of the business application. The device-level security check policy may be configured based on the check results of security check items such as environment awareness, identity verification, abnormal behavior, and the like, for example, the device-level security check policy may include a policy during traffic anomaly, remote login, and suspicious download. The trust scoring rules may include scoring criteria, deducting criteria, and/or scoring weights. The trust score rule may also be configured based on the checking results of security checking items such as environment awareness, identity verification, abnormal behavior, and the like, for example, the trust score rule may include that a device lock screen password is not compliant and is deducted by 5 points.
In this embodiment, the method may configure a security level scoring rule for the business application access principal, for example, the security level scoring rule may include trust score thresholds of different security levels, so as to determine the security level of the business application access principal according to the trust score of the business application access principal. For example, the security level scoring rule includes a trust score of less than 50 points, the security level being high risk; the trust score equals 100 points, the security level is healthy. The method can also weight the checking results of each security checking item to obtain the trust score of the business application access subject, and determine the security level of the business application access subject according to the trust score.
In this embodiment, the method may set the authority of the user to access the service application when the service application access subject is in different security levels. The permissions may include access permissions, functional permissions, data permissions, etc. of the business application. For example, the method can configure whether the user has the access right, the function right and the data right of the service application under different security levels of the service application access subject.
In this embodiment, the method may configure application-level security policies for the service applications with different importance levels and different function categories, where the application-level security policies may include multiple security check items such as environment awareness, identity verification, and abnormal behavior. The environment-aware security check items can detect and analyze the terminal environment, identity information and operation behavior of the business application access subject.
In this embodiment, the method for configuring a service application according to the service specification includes: when the service application is on shelf, the application manager can configure the importance level and the function category of the service application and the authority of the service application when the service application access subject is in different safety levels according to the service specification. The security administrator can configure a device-level security check policy and a trust score rule, a security level score rule of a business application access subject and an application-level security policy of a business application for the business application access subject.
Further, in some embodiments, the business application is further configured to receive a trust score of the client and adjust the user access rights according to the trust score.
In this embodiment, the client may perform continuous trust evaluation on the terminal environment, the identity information, and the operation behavior according to the device-level security policy and the trust score rule to obtain a trust score, obtain the security level of the client according to the trust score and the security level score rule, and obtain the user access permission of each level of service applications according to the obtained security level, thereby implementing dynamic authorization with minimum granularity, and ensuring the security of the service applications. The client may configure the application-level security policy to take effect for a given business application.
In this embodiment, referring to fig. 3, after a service application is issued to a client, the client receives authentication information entered by a user, the client sends the authentication information to a core authentication and authorization device for authentication, and when authentication is successful, a session between the client and the core authentication and authorization device is established. And the client sends the device-level security check strategy, the application-level security strategy and the authority to the security gateway, performs continuous trust scoring, and reports the obtained security level to the security gateway. And if the security level changes, re-authenticating the core authentication and authorization equipment and the service system. When a user opens a service application of a client, the client initiates authentication to a service system, the service system requests service function data authority to a core authentication authorization device, the core authentication authorization device returns the service function data authority to the service system, the service system returns an authentication result to the client, the client initiates a service request to the service system, and the service system responds to the service request to the client. Therefore, the method can release the access subject full-flow encryption which accords with the security level based on the local trusted agent and the business trusted access service agent, otherwise, the blocking is carried out, and the application dynamic access control is realized.
A business application management system, see fig. 4, comprising:
the management platform 1: the system comprises a business application management library, a business application management library and a business application management module, wherein the business application management library is used for receiving the importance level and the function type of the business application to be shelved and searching the business application management library according to the importance level and the function type to obtain the business specification of the business application to be shelved; the management platform 1 is further configured to configure the service application according to the service specification after the service application is put on shelf, and issue the configured service application to the client 2;
and the client side 2: for running business applications.
Further, in some embodiments, the business application management library is constructed by:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring application level security policies of the business applications with different importance levels and different function classes.
Further, in some embodiments, the device-level security check policy and the trust scoring rule each correspond to at least one of the following security check terms:
context awareness, identity verification, and abnormal behavior.
Further, in some embodiments, the rights include:
access rights, functional rights and data rights of the service application.
Further, in some embodiments, the business application is further configured to receive a trust score of the client 2 and adjust the user's access rights according to the trust score.
For the sake of brief description, the system provided by the embodiment of the present invention may refer to the corresponding content in the foregoing embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.
Claims (10)
1. A method for managing service applications, comprising:
receiving the importance level and the function category of the service application to be put on shelf;
searching a service application management library according to the importance level and the function category to obtain the service specification of the service application to be shelved;
after the business application is put on shelf, configuring the business application according to the business specification;
and issuing the configured service application to a client.
2. The service application management method according to claim 1,
the business application management library is constructed by the following method:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring application level security policies of the business applications with different importance levels and different function classes.
3. The business application management method of claim 2,
the device-level security inspection policy and the trust scoring rule respectively correspond to at least one of the following security inspection items:
context awareness, identity verification, and abnormal behavior.
4. The business application management method of claim 2, wherein the right comprises:
access rights, functional rights and data rights of the service application.
5. The business application management method of claim 2,
and the service application is also used for receiving the trust score of the client and adjusting the access authority of the user according to the trust score.
6. A business application management system, comprising:
a management platform: the system comprises a business application management library, a business application management library and a business application management module, wherein the business application management library is used for receiving the importance level and the function type of the business application to be shelved and searching the business application management library according to the importance level and the function type to obtain the business specification of the business application to be shelved; the management platform is further used for configuring the service application according to the service specification after the service application is put on shelf and sending the configured service application to a client;
a client: for running the business application.
7. The business application management system of claim 6,
the business application management library is constructed by the following method:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring application level security policies of the business applications with different importance levels and different function classes.
8. The business application management system of claim 7,
the device-level security inspection policy and the trust scoring rule respectively correspond to at least one of the following security inspection items:
context awareness, identity verification, and abnormal behavior.
9. The business application management system of claim 7, wherein the rights comprise:
access rights, functional rights and data rights of the business application.
10. The business application management system of claim 7,
and the service application is also used for receiving the trust score of the client and adjusting the access authority of the user according to the trust score.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210384470.7A CN115021951B (en) | 2022-04-13 | 2022-04-13 | Business application management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210384470.7A CN115021951B (en) | 2022-04-13 | 2022-04-13 | Business application management method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115021951A true CN115021951A (en) | 2022-09-06 |
CN115021951B CN115021951B (en) | 2024-05-17 |
Family
ID=83067787
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210384470.7A Active CN115021951B (en) | 2022-04-13 | 2022-04-13 | Business application management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115021951B (en) |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003087982A2 (en) * | 2002-04-08 | 2003-10-23 | Cyanea Systems Corp. | Method and system for problem determination in distributed enterprise applications |
WO2013122991A1 (en) * | 2012-02-13 | 2013-08-22 | Antenna Software, Inc. | Integrated mobile application development platform |
WO2015192796A1 (en) * | 2014-06-20 | 2015-12-23 | 中国银联股份有限公司 | Automatic application release method and system based on trusted service manager |
CN106487775A (en) * | 2015-09-01 | 2017-03-08 | 阿里巴巴集团控股有限公司 | A kind for the treatment of method and apparatus of the business datum based on cloud platform |
CN106647560A (en) * | 2016-11-23 | 2017-05-10 | 中国南方电网有限责任公司 | Mobile application unified management method |
CN108183915A (en) * | 2018-01-15 | 2018-06-19 | 中国科学院信息工程研究所 | It is a kind of to realize frame towards the safety label of high safety grade business and application demand |
CN109873834A (en) * | 2019-03-22 | 2019-06-11 | 云南电网有限责任公司 | A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing |
US20190385099A1 (en) * | 2018-06-18 | 2019-12-19 | Bank Of America Corporation | Core process framework for integrating disparate applications |
CN111539775A (en) * | 2020-05-07 | 2020-08-14 | 网易(杭州)网络有限公司 | Application program management method and device |
CN111708698A (en) * | 2020-06-16 | 2020-09-25 | 中国银行股份有限公司 | Application program simulation filing method and related device |
CN111738296A (en) * | 2020-05-22 | 2020-10-02 | 广东科学技术职业学院 | One-stop service platform based on data fusion |
CN111932343A (en) * | 2020-08-14 | 2020-11-13 | 深圳市泽汇科技有限公司 | Automatic product shelf loading management method, device, equipment and storage medium |
CN112068807A (en) * | 2020-07-17 | 2020-12-11 | 石化盈科信息技术有限责任公司 | Process industrial application software ecosystem, development method and storage medium |
CN112153425A (en) * | 2020-09-03 | 2020-12-29 | 河南网络广播电视台有限公司 | Broadcast control management system |
CN112256588A (en) * | 2020-11-10 | 2021-01-22 | 广州掌动智能科技有限公司 | Resource allocation method for application program test, computer readable storage medium and tester |
CN112380522A (en) * | 2020-11-11 | 2021-02-19 | 深圳供电局有限公司 | Management system and method for integrated service mobile application |
CN112783384A (en) * | 2019-11-08 | 2021-05-11 | 荣耀终端有限公司 | Control method for cloud application operation and electronic equipment |
CN113296744A (en) * | 2021-05-21 | 2021-08-24 | 建信金融科技有限责任公司 | Application development system and method |
CN113568970A (en) * | 2021-02-03 | 2021-10-29 | 腾讯科技(深圳)有限公司 | Application service data management method, device, equipment and storage medium |
-
2022
- 2022-04-13 CN CN202210384470.7A patent/CN115021951B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003087982A2 (en) * | 2002-04-08 | 2003-10-23 | Cyanea Systems Corp. | Method and system for problem determination in distributed enterprise applications |
WO2013122991A1 (en) * | 2012-02-13 | 2013-08-22 | Antenna Software, Inc. | Integrated mobile application development platform |
WO2015192796A1 (en) * | 2014-06-20 | 2015-12-23 | 中国银联股份有限公司 | Automatic application release method and system based on trusted service manager |
CN105279670A (en) * | 2014-06-20 | 2016-01-27 | 中国银联股份有限公司 | Automatic application publishing method and system based on trusted service management platform |
CN106487775A (en) * | 2015-09-01 | 2017-03-08 | 阿里巴巴集团控股有限公司 | A kind for the treatment of method and apparatus of the business datum based on cloud platform |
CN106647560A (en) * | 2016-11-23 | 2017-05-10 | 中国南方电网有限责任公司 | Mobile application unified management method |
CN108183915A (en) * | 2018-01-15 | 2018-06-19 | 中国科学院信息工程研究所 | It is a kind of to realize frame towards the safety label of high safety grade business and application demand |
US20190385099A1 (en) * | 2018-06-18 | 2019-12-19 | Bank Of America Corporation | Core process framework for integrating disparate applications |
CN109873834A (en) * | 2019-03-22 | 2019-06-11 | 云南电网有限责任公司 | A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing |
CN112783384A (en) * | 2019-11-08 | 2021-05-11 | 荣耀终端有限公司 | Control method for cloud application operation and electronic equipment |
CN111539775A (en) * | 2020-05-07 | 2020-08-14 | 网易(杭州)网络有限公司 | Application program management method and device |
CN111738296A (en) * | 2020-05-22 | 2020-10-02 | 广东科学技术职业学院 | One-stop service platform based on data fusion |
CN111708698A (en) * | 2020-06-16 | 2020-09-25 | 中国银行股份有限公司 | Application program simulation filing method and related device |
CN112068807A (en) * | 2020-07-17 | 2020-12-11 | 石化盈科信息技术有限责任公司 | Process industrial application software ecosystem, development method and storage medium |
CN111932343A (en) * | 2020-08-14 | 2020-11-13 | 深圳市泽汇科技有限公司 | Automatic product shelf loading management method, device, equipment and storage medium |
CN112153425A (en) * | 2020-09-03 | 2020-12-29 | 河南网络广播电视台有限公司 | Broadcast control management system |
CN112256588A (en) * | 2020-11-10 | 2021-01-22 | 广州掌动智能科技有限公司 | Resource allocation method for application program test, computer readable storage medium and tester |
CN112380522A (en) * | 2020-11-11 | 2021-02-19 | 深圳供电局有限公司 | Management system and method for integrated service mobile application |
CN113568970A (en) * | 2021-02-03 | 2021-10-29 | 腾讯科技(深圳)有限公司 | Application service data management method, device, equipment and storage medium |
CN113296744A (en) * | 2021-05-21 | 2021-08-24 | 建信金融科技有限责任公司 | Application development system and method |
Non-Patent Citations (2)
Title |
---|
Y. ZENG等: ""Design of Mobile Application Lifecycle Security Management Platform"", 《2021 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA)》, 19 November 2021 (2021-11-19) * |
徐隆龙;李莹;胡博;: "面向企业的移动信息化整体解决方案", 计算机系统应用, no. 12, 15 December 2014 (2014-12-15) * |
Also Published As
Publication number | Publication date |
---|---|
CN115021951B (en) | 2024-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8601531B1 (en) | System authorization based upon content sensitivity | |
US9137096B1 (en) | Policy based network compliance | |
US10140453B1 (en) | Vulnerability management using taxonomy-based normalization | |
US8880893B2 (en) | Enterprise information asset protection through insider attack specification, monitoring and mitigation | |
US9338176B2 (en) | Systems and methods of identity and access management | |
US20060020816A1 (en) | Method and system for managing authentication attempts | |
CN104036166B (en) | The user of forced symmetric centralization is supported to put forward power method | |
JP2005526311A (en) | Method and apparatus for monitoring a database system | |
US8869234B2 (en) | System and method for policy based privileged user access management | |
CN1981277A (en) | Quarantine system | |
CN111935165A (en) | Access control method, device, electronic device and medium | |
US20090106844A1 (en) | System and method for vulnerability assessment of network based on business model | |
US20160088017A1 (en) | Conditional Access to Services Based on Device Claims | |
US10015153B1 (en) | Security using velocity metrics identifying authentication performance for a set of devices | |
CN114003943B (en) | Safe double-control management platform for computer room trusteeship management | |
US20040111645A1 (en) | Method for providing access control to single sign-on computer networks | |
US20230362263A1 (en) | Automatically Executing Responsive Actions Upon Detecting an Incomplete Account Lineage Chain | |
CN114024764A (en) | Monitoring method, monitoring system, equipment and storage medium for abnormal access of database | |
CN114338105B (en) | Zero trust based system for creating fort | |
KR101768942B1 (en) | System and method for secure authentication to user access | |
JP3973563B2 (en) | Login request receiving apparatus, login request receiving method, and program therefor | |
JP4843546B2 (en) | Information leakage monitoring system and information leakage monitoring method | |
CN111030997A (en) | Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium | |
CN115021951B (en) | Business application management method and system | |
CN112149078A (en) | Auditing method and system for manufacturing execution system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |