CN115021951A - Service application management method and system - Google Patents

Service application management method and system Download PDF

Info

Publication number
CN115021951A
CN115021951A CN202210384470.7A CN202210384470A CN115021951A CN 115021951 A CN115021951 A CN 115021951A CN 202210384470 A CN202210384470 A CN 202210384470A CN 115021951 A CN115021951 A CN 115021951A
Authority
CN
China
Prior art keywords
business
application
service
business application
service application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210384470.7A
Other languages
Chinese (zh)
Other versions
CN115021951B (en
Inventor
晏雨琪
汪善富
王志
祝青柳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Leagsoft Technology Co ltd
Original Assignee
Shenzhen Leagsoft Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Leagsoft Technology Co ltd filed Critical Shenzhen Leagsoft Technology Co ltd
Priority to CN202210384470.7A priority Critical patent/CN115021951B/en
Publication of CN115021951A publication Critical patent/CN115021951A/en
Application granted granted Critical
Publication of CN115021951B publication Critical patent/CN115021951B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a business application management method and a system, wherein the method comprises the steps of receiving importance levels and function categories of business applications to be put on shelf; searching a service application management library according to the importance level and the function category to obtain a service specification of the service application to be put on shelf; after the business application is put on shelf, configuring the business application according to the business specification; and sending the configured service application to the client. The method has the following advantages: before the business application is put on shelf, the system can assist enterprises to make standard business specifications according to importance levels and function categories, so that all departments can perform flow control according to the unified business specifications, and the communication cost among all the departments is reduced. The service application is managed by the same system platform, so that the service, safety and authorization integrated full-flow management is realized, a plurality of system platforms do not need to be connected in a butt joint mode, and the management operation and maintenance efficiency is improved.

Description

Service application management method and system
Technical Field
The invention belongs to the technical field of application security, and particularly relates to a service application management method and system.
Background
In the era of rapid development of mobile services, the safety standard management of service applications in enterprises is very important. At present, service application development, application security management and security audit in the service process of most enterprises belong to personnel management of different departments, and the used systems are different. The service development department mainly focuses on the functionality of the service, has low attention on the safety compliance of service application, and only hopes that the service is rapidly put on shelf for popularization and use. The application management department only cares about release and popularization of the application, management of application authority, access control and identity authentication, and does not care about security risks faced by the application. The security audit department mainly focuses on the aspects of terminal security, mobile security, boundary security, operation and maintenance security, data security and the like.
Due to the diversity and complexity of the business, most of the interior of the enterprise lacks a uniform business application management standard, and because the focus of attention is different, each department has a contradiction point, and the communication cost is high. Meanwhile, because each department uses different systems, the butt joint is difficult, and the rapid and safe shelving popularization of business application is not facilitated.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a service application management method and a service application management system, which unify the service application management standard and reduce the communication cost among all departments.
In a first aspect, a method for managing a service application includes:
receiving the importance level and the function category of the service application to be put on shelf;
searching a service application management library according to the importance level and the function category to obtain a service specification of the service application to be put on shelf;
after the business application is put on shelf, the business application is configured according to the business specification;
and sending the configured service application to the client.
Preferably, the service application management library is constructed by the following method:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring application level security policies of the business applications with different importance levels and different function classes.
Preferably, the device-level security check policy and the trust scoring rule respectively correspond to at least one of the following security check items:
context awareness, identity verification, and abnormal behavior.
Preferably, the rights include:
access rights, functional rights and data rights of the business application.
Preferably, the service application is further configured to receive a trust score of the client, and adjust the user access right according to the trust score.
In a second aspect, a business application management system includes:
a management platform: the system comprises a business application management library, a business application management library and a business application management module, wherein the business application management library is used for receiving the importance level and the function type of the business application to be shelved and searching the business application management library according to the importance level and the function type to obtain the business specification of the business application to be shelved; the management platform is also used for configuring the service application according to the service specification after the service application is put on shelf and sending the configured service application to the client;
a client: for running business applications.
Preferably, the service application management library is constructed by the following method:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring the application level security policies of the business applications with different importance levels and different function classes.
Preferably, the device-level security check policy and the trust scoring rule respectively correspond to at least one of the following security check items:
context awareness, identity verification, and abnormal behavior.
Preferably, the rights include:
access rights, functional rights and data rights of the service application.
Preferably, the service application is further configured to receive a trust score of the client, and adjust the user access right according to the trust score.
According to the technical scheme, the service application management method and the service application management system provided by the invention have the following advantages:
1) before the business application is put on shelf, the system can assist enterprises to make standard business specifications according to importance levels and function categories, so that all departments can perform flow control according to the unified business specifications, and the communication cost among all the departments is reduced.
2) The service application is managed by the same system platform, so that the service, safety and authorization integrated full-flow management is realized, a plurality of system platforms do not need to be connected in a butt joint mode, and the management operation and maintenance efficiency is improved.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a flowchart of a service application management method according to an embodiment.
Fig. 2 is a flowchart of a method for setting and configuring a service specification according to an embodiment.
Fig. 3 is a flowchart of a method for running a service application according to an embodiment.
Fig. 4 is a block diagram of a business application management system according to an embodiment.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby. It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Example (b):
a business application management method, see fig. 1, comprising:
s1: receiving the importance level and the function category of the service application to be put on shelf;
s2: searching a service application management library according to the importance level and the function category to obtain a service specification of the service application to be put on shelf;
s3: after the business application is put on shelf, the business application is configured according to the business specification;
s4: and sending the configured service application to the client.
In a traditional business application management method, when a new business application needs to be put on shelf, each department of an enterprise needs to configure information such as operation authority, access authority, security policy and the like of the business application. Generally, business applications of the same type, the same enterprise, or the same industry are managed by using the same set of rules, so for the business applications managed by using the same set of rules, many configuration operations at the front end of the business applications are repeated, and different information has a certain correlation, for example, the access rights of the business applications of the same importance level are the same. Therefore, the method associates the service specifications with the importance levels and the function types respectively, and automatically generates the corresponding service specifications after the importance levels and the function types of the service application are determined, thereby reducing the communication cost of each department.
In this embodiment, the importance levels of the business applications of the same type, the same enterprise, or the same industry may include multiple levels, for example, the importance levels may be divided into 5 levels: A1-A5. The importance level also supports customization, e.g., can be customized to general, important, core, etc. The functional categories of the business application can comprise a plurality of categories and also support customization, for example, the functional categories can be mobile office, mobile exhibition industry and the like. Business applications under the same functional class may have multiple levels of importance, or business applications under the same level of importance may have multiple functional classes. The service application management library stores a plurality of service specifications, and each service specification corresponds to a function class and an importance level. According to the method, after the application store shelves the service application, the application store can perform clustering display on the service application according to the function category and the importance level.
In this embodiment, before the business application is put on shelf, the method may be implemented by entering, by an enterprise-related person, an importance level and a function category of the business application, then searching for a corresponding business specification according to the importance level and the function category, after the business application is put on shelf, uniformly configuring the business application according to the business specification, and after the configuration is completed, issuing the business application to the client for use.
The service application management method has the following advantages:
1) before business application is put on shelf, enterprises can be assisted to make standard business specifications according to importance levels and function categories, so that all departments can perform flow control according to the unified business specifications, and communication cost among all the departments is reduced.
2) The service application is managed by the same system platform, so that the service, safety and authorization integrated full-flow management is realized, a plurality of system platforms do not need to be connected in a butt joint mode, and the management operation and maintenance efficiency is improved.
Further, in some embodiments, referring to fig. 2, the business application management library is constructed by:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring the application level security policies of the business applications with different importance levels and different function classes.
In this embodiment, the service application access subject is an object for using the service application, and mainly includes a client. The method can configure different equipment level security check strategies and trust scoring rules for different business application access subjects on the premise of determining the importance level and the function category of the business application. The device-level security check policy may be configured based on the check results of security check items such as environment awareness, identity verification, abnormal behavior, and the like, for example, the device-level security check policy may include a policy during traffic anomaly, remote login, and suspicious download. The trust scoring rules may include scoring criteria, deducting criteria, and/or scoring weights. The trust score rule may also be configured based on the checking results of security checking items such as environment awareness, identity verification, abnormal behavior, and the like, for example, the trust score rule may include that a device lock screen password is not compliant and is deducted by 5 points.
In this embodiment, the method may configure a security level scoring rule for the business application access principal, for example, the security level scoring rule may include trust score thresholds of different security levels, so as to determine the security level of the business application access principal according to the trust score of the business application access principal. For example, the security level scoring rule includes a trust score of less than 50 points, the security level being high risk; the trust score equals 100 points, the security level is healthy. The method can also weight the checking results of each security checking item to obtain the trust score of the business application access subject, and determine the security level of the business application access subject according to the trust score.
In this embodiment, the method may set the authority of the user to access the service application when the service application access subject is in different security levels. The permissions may include access permissions, functional permissions, data permissions, etc. of the business application. For example, the method can configure whether the user has the access right, the function right and the data right of the service application under different security levels of the service application access subject.
In this embodiment, the method may configure application-level security policies for the service applications with different importance levels and different function categories, where the application-level security policies may include multiple security check items such as environment awareness, identity verification, and abnormal behavior. The environment-aware security check items can detect and analyze the terminal environment, identity information and operation behavior of the business application access subject.
In this embodiment, the method for configuring a service application according to the service specification includes: when the service application is on shelf, the application manager can configure the importance level and the function category of the service application and the authority of the service application when the service application access subject is in different safety levels according to the service specification. The security administrator can configure a device-level security check policy and a trust score rule, a security level score rule of a business application access subject and an application-level security policy of a business application for the business application access subject.
Further, in some embodiments, the business application is further configured to receive a trust score of the client and adjust the user access rights according to the trust score.
In this embodiment, the client may perform continuous trust evaluation on the terminal environment, the identity information, and the operation behavior according to the device-level security policy and the trust score rule to obtain a trust score, obtain the security level of the client according to the trust score and the security level score rule, and obtain the user access permission of each level of service applications according to the obtained security level, thereby implementing dynamic authorization with minimum granularity, and ensuring the security of the service applications. The client may configure the application-level security policy to take effect for a given business application.
In this embodiment, referring to fig. 3, after a service application is issued to a client, the client receives authentication information entered by a user, the client sends the authentication information to a core authentication and authorization device for authentication, and when authentication is successful, a session between the client and the core authentication and authorization device is established. And the client sends the device-level security check strategy, the application-level security strategy and the authority to the security gateway, performs continuous trust scoring, and reports the obtained security level to the security gateway. And if the security level changes, re-authenticating the core authentication and authorization equipment and the service system. When a user opens a service application of a client, the client initiates authentication to a service system, the service system requests service function data authority to a core authentication authorization device, the core authentication authorization device returns the service function data authority to the service system, the service system returns an authentication result to the client, the client initiates a service request to the service system, and the service system responds to the service request to the client. Therefore, the method can release the access subject full-flow encryption which accords with the security level based on the local trusted agent and the business trusted access service agent, otherwise, the blocking is carried out, and the application dynamic access control is realized.
A business application management system, see fig. 4, comprising:
the management platform 1: the system comprises a business application management library, a business application management library and a business application management module, wherein the business application management library is used for receiving the importance level and the function type of the business application to be shelved and searching the business application management library according to the importance level and the function type to obtain the business specification of the business application to be shelved; the management platform 1 is further configured to configure the service application according to the service specification after the service application is put on shelf, and issue the configured service application to the client 2;
and the client side 2: for running business applications.
Further, in some embodiments, the business application management library is constructed by:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring application level security policies of the business applications with different importance levels and different function classes.
Further, in some embodiments, the device-level security check policy and the trust scoring rule each correspond to at least one of the following security check terms:
context awareness, identity verification, and abnormal behavior.
Further, in some embodiments, the rights include:
access rights, functional rights and data rights of the service application.
Further, in some embodiments, the business application is further configured to receive a trust score of the client 2 and adjust the user's access rights according to the trust score.
For the sake of brief description, the system provided by the embodiment of the present invention may refer to the corresponding content in the foregoing embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (10)

1. A method for managing service applications, comprising:
receiving the importance level and the function category of the service application to be put on shelf;
searching a service application management library according to the importance level and the function category to obtain the service specification of the service application to be shelved;
after the business application is put on shelf, configuring the business application according to the business specification;
and issuing the configured service application to a client.
2. The service application management method according to claim 1,
the business application management library is constructed by the following method:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring application level security policies of the business applications with different importance levels and different function classes.
3. The business application management method of claim 2,
the device-level security inspection policy and the trust scoring rule respectively correspond to at least one of the following security inspection items:
context awareness, identity verification, and abnormal behavior.
4. The business application management method of claim 2, wherein the right comprises:
access rights, functional rights and data rights of the service application.
5. The business application management method of claim 2,
and the service application is also used for receiving the trust score of the client and adjusting the access authority of the user according to the trust score.
6. A business application management system, comprising:
a management platform: the system comprises a business application management library, a business application management library and a business application management module, wherein the business application management library is used for receiving the importance level and the function type of the business application to be shelved and searching the business application management library according to the importance level and the function type to obtain the business specification of the business application to be shelved; the management platform is further used for configuring the service application according to the service specification after the service application is put on shelf and sending the configured service application to a client;
a client: for running the business application.
7. The business application management system of claim 6,
the business application management library is constructed by the following method:
configuring different importance levels and different function categories in service application;
configuring a device-level security check strategy and a trust scoring rule of a business application access subject;
configuring a security level scoring rule of a business application access subject;
configuring the authority of a user for accessing the service application when the service application access subject is in different security levels;
and configuring application level security policies of the business applications with different importance levels and different function classes.
8. The business application management system of claim 7,
the device-level security inspection policy and the trust scoring rule respectively correspond to at least one of the following security inspection items:
context awareness, identity verification, and abnormal behavior.
9. The business application management system of claim 7, wherein the rights comprise:
access rights, functional rights and data rights of the business application.
10. The business application management system of claim 7,
and the service application is also used for receiving the trust score of the client and adjusting the access authority of the user according to the trust score.
CN202210384470.7A 2022-04-13 2022-04-13 Business application management method and system Active CN115021951B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210384470.7A CN115021951B (en) 2022-04-13 2022-04-13 Business application management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210384470.7A CN115021951B (en) 2022-04-13 2022-04-13 Business application management method and system

Publications (2)

Publication Number Publication Date
CN115021951A true CN115021951A (en) 2022-09-06
CN115021951B CN115021951B (en) 2024-05-17

Family

ID=83067787

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210384470.7A Active CN115021951B (en) 2022-04-13 2022-04-13 Business application management method and system

Country Status (1)

Country Link
CN (1) CN115021951B (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003087982A2 (en) * 2002-04-08 2003-10-23 Cyanea Systems Corp. Method and system for problem determination in distributed enterprise applications
WO2013122991A1 (en) * 2012-02-13 2013-08-22 Antenna Software, Inc. Integrated mobile application development platform
WO2015192796A1 (en) * 2014-06-20 2015-12-23 中国银联股份有限公司 Automatic application release method and system based on trusted service manager
CN106487775A (en) * 2015-09-01 2017-03-08 阿里巴巴集团控股有限公司 A kind for the treatment of method and apparatus of the business datum based on cloud platform
CN106647560A (en) * 2016-11-23 2017-05-10 中国南方电网有限责任公司 Mobile application unified management method
CN108183915A (en) * 2018-01-15 2018-06-19 中国科学院信息工程研究所 It is a kind of to realize frame towards the safety label of high safety grade business and application demand
CN109873834A (en) * 2019-03-22 2019-06-11 云南电网有限责任公司 A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing
US20190385099A1 (en) * 2018-06-18 2019-12-19 Bank Of America Corporation Core process framework for integrating disparate applications
CN111539775A (en) * 2020-05-07 2020-08-14 网易(杭州)网络有限公司 Application program management method and device
CN111708698A (en) * 2020-06-16 2020-09-25 中国银行股份有限公司 Application program simulation filing method and related device
CN111738296A (en) * 2020-05-22 2020-10-02 广东科学技术职业学院 One-stop service platform based on data fusion
CN111932343A (en) * 2020-08-14 2020-11-13 深圳市泽汇科技有限公司 Automatic product shelf loading management method, device, equipment and storage medium
CN112068807A (en) * 2020-07-17 2020-12-11 石化盈科信息技术有限责任公司 Process industrial application software ecosystem, development method and storage medium
CN112153425A (en) * 2020-09-03 2020-12-29 河南网络广播电视台有限公司 Broadcast control management system
CN112256588A (en) * 2020-11-10 2021-01-22 广州掌动智能科技有限公司 Resource allocation method for application program test, computer readable storage medium and tester
CN112380522A (en) * 2020-11-11 2021-02-19 深圳供电局有限公司 Management system and method for integrated service mobile application
CN112783384A (en) * 2019-11-08 2021-05-11 荣耀终端有限公司 Control method for cloud application operation and electronic equipment
CN113296744A (en) * 2021-05-21 2021-08-24 建信金融科技有限责任公司 Application development system and method
CN113568970A (en) * 2021-02-03 2021-10-29 腾讯科技(深圳)有限公司 Application service data management method, device, equipment and storage medium

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003087982A2 (en) * 2002-04-08 2003-10-23 Cyanea Systems Corp. Method and system for problem determination in distributed enterprise applications
WO2013122991A1 (en) * 2012-02-13 2013-08-22 Antenna Software, Inc. Integrated mobile application development platform
WO2015192796A1 (en) * 2014-06-20 2015-12-23 中国银联股份有限公司 Automatic application release method and system based on trusted service manager
CN105279670A (en) * 2014-06-20 2016-01-27 中国银联股份有限公司 Automatic application publishing method and system based on trusted service management platform
CN106487775A (en) * 2015-09-01 2017-03-08 阿里巴巴集团控股有限公司 A kind for the treatment of method and apparatus of the business datum based on cloud platform
CN106647560A (en) * 2016-11-23 2017-05-10 中国南方电网有限责任公司 Mobile application unified management method
CN108183915A (en) * 2018-01-15 2018-06-19 中国科学院信息工程研究所 It is a kind of to realize frame towards the safety label of high safety grade business and application demand
US20190385099A1 (en) * 2018-06-18 2019-12-19 Bank Of America Corporation Core process framework for integrating disparate applications
CN109873834A (en) * 2019-03-22 2019-06-11 云南电网有限责任公司 A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing
CN112783384A (en) * 2019-11-08 2021-05-11 荣耀终端有限公司 Control method for cloud application operation and electronic equipment
CN111539775A (en) * 2020-05-07 2020-08-14 网易(杭州)网络有限公司 Application program management method and device
CN111738296A (en) * 2020-05-22 2020-10-02 广东科学技术职业学院 One-stop service platform based on data fusion
CN111708698A (en) * 2020-06-16 2020-09-25 中国银行股份有限公司 Application program simulation filing method and related device
CN112068807A (en) * 2020-07-17 2020-12-11 石化盈科信息技术有限责任公司 Process industrial application software ecosystem, development method and storage medium
CN111932343A (en) * 2020-08-14 2020-11-13 深圳市泽汇科技有限公司 Automatic product shelf loading management method, device, equipment and storage medium
CN112153425A (en) * 2020-09-03 2020-12-29 河南网络广播电视台有限公司 Broadcast control management system
CN112256588A (en) * 2020-11-10 2021-01-22 广州掌动智能科技有限公司 Resource allocation method for application program test, computer readable storage medium and tester
CN112380522A (en) * 2020-11-11 2021-02-19 深圳供电局有限公司 Management system and method for integrated service mobile application
CN113568970A (en) * 2021-02-03 2021-10-29 腾讯科技(深圳)有限公司 Application service data management method, device, equipment and storage medium
CN113296744A (en) * 2021-05-21 2021-08-24 建信金融科技有限责任公司 Application development system and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Y. ZENG等: ""Design of Mobile Application Lifecycle Security Management Platform"", 《2021 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA)》, 19 November 2021 (2021-11-19) *
徐隆龙;李莹;胡博;: "面向企业的移动信息化整体解决方案", 计算机系统应用, no. 12, 15 December 2014 (2014-12-15) *

Also Published As

Publication number Publication date
CN115021951B (en) 2024-05-17

Similar Documents

Publication Publication Date Title
US8601531B1 (en) System authorization based upon content sensitivity
US9137096B1 (en) Policy based network compliance
US10140453B1 (en) Vulnerability management using taxonomy-based normalization
US8880893B2 (en) Enterprise information asset protection through insider attack specification, monitoring and mitigation
US9338176B2 (en) Systems and methods of identity and access management
US20060020816A1 (en) Method and system for managing authentication attempts
CN104036166B (en) The user of forced symmetric centralization is supported to put forward power method
JP2005526311A (en) Method and apparatus for monitoring a database system
US8869234B2 (en) System and method for policy based privileged user access management
CN1981277A (en) Quarantine system
CN111935165A (en) Access control method, device, electronic device and medium
US20090106844A1 (en) System and method for vulnerability assessment of network based on business model
US20160088017A1 (en) Conditional Access to Services Based on Device Claims
US10015153B1 (en) Security using velocity metrics identifying authentication performance for a set of devices
CN114003943B (en) Safe double-control management platform for computer room trusteeship management
US20040111645A1 (en) Method for providing access control to single sign-on computer networks
US20230362263A1 (en) Automatically Executing Responsive Actions Upon Detecting an Incomplete Account Lineage Chain
CN114024764A (en) Monitoring method, monitoring system, equipment and storage medium for abnormal access of database
CN114338105B (en) Zero trust based system for creating fort
KR101768942B1 (en) System and method for secure authentication to user access
JP3973563B2 (en) Login request receiving apparatus, login request receiving method, and program therefor
JP4843546B2 (en) Information leakage monitoring system and information leakage monitoring method
CN111030997A (en) Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium
CN115021951B (en) Business application management method and system
CN112149078A (en) Auditing method and system for manufacturing execution system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant