CN102647419B - Security policy online detection system facing to terminal computers - Google Patents

Security policy online detection system facing to terminal computers Download PDF

Info

Publication number
CN102647419B
CN102647419B CN201210099538.3A CN201210099538A CN102647419B CN 102647419 B CN102647419 B CN 102647419B CN 201210099538 A CN201210099538 A CN 201210099538A CN 102647419 B CN102647419 B CN 102647419B
Authority
CN
China
Prior art keywords
tactful
strategy
module
content
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210099538.3A
Other languages
Chinese (zh)
Other versions
CN102647419A (en
Inventor
文梁
韩磊
陈燕军
刘霞
姜红星
赵飞
朱喜刚
邓文浩
张东山
唐立才
张敬鹏
吴宏彬
方超
纪树峰
杨景校
吴晓明
王旭
石志勇
陈佳
纪曦
赵卫灵
陈楚平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG AEROSPACE SATELLITE TECHNOLOGY Co Ltd
Beijing Institute of Spacecraft System Engineering
Original Assignee
GUANGDONG AEROSPACE SATELLITE TECHNOLOGY Co Ltd
Beijing Institute of Spacecraft System Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG AEROSPACE SATELLITE TECHNOLOGY Co Ltd, Beijing Institute of Spacecraft System Engineering filed Critical GUANGDONG AEROSPACE SATELLITE TECHNOLOGY Co Ltd
Priority to CN201210099538.3A priority Critical patent/CN102647419B/en
Publication of CN102647419A publication Critical patent/CN102647419A/en
Application granted granted Critical
Publication of CN102647419B publication Critical patent/CN102647419B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a security policy online detection system facing to terminal computers. All the terminal computers are intensively detected on line on a central computer; all the computers are connected through a network; the system comprises an online detection tool, a packaging module and the central computer, wherein the packaging module is used for packaging the online detection tool into a CAB form to be stored on the central computer; the central computer is used for embedding the CAB into an IE (Internet Explorer) browser; the terminal computers download the CAB from the central computer through the IE browser and automatically install the CAB; and the online detection tool comprises a policy defining module, a uniform data interface module, a checking analyzing module, a policy internal ratio module and a display module. The system has the advantages of short development period, good maintainability, flexibility of opening an interface, complete debugging function and easiness for use and management.

Description

The safe On line inspection system of strategy of terminaloriented computer
Technical field
The present invention relates to a kind of strategy of terminaloriented computer, management and the control of safety, belong to inspection computer security technical field.
Background technology
In large-scale network system, generally including a large amount of different network equipments, for example gateway, router and service is provided, moves server, the client computer of various application programs to user.Equipment, service, application program, server, client computer and user, even the relation between them is all the object that needs management.Complicated in the internal height of this large-scale networks, cause managing abnormal difficult, the management cycle is tediously long, and along with the expansion of system scale, the expense of management also exponentially rule increases.
The management of network security policy is the requisite part of any network system management, it is improper that network security configures, may make some users have too high authority on the one hand, and make other need the user of high authority to can not get corresponding authority, cause authority mis-arrange; Also may bring very large potential safety hazard to network on the other hand, reduce the Prevention-Security ability of whole network.
At present general operation is to utilize the various functions that computer provides to go arrange and obtain these strategies, but these functions disperse, and arrange abundant not, do not reach a lot of important function that user needs.For existing function, also need the certain computer major technological know-how of user's needs to use, and arrange loaded down with trivial detailsly, be unfavorable for user's operation.
Summary of the invention
Technology of the present invention is dealt with problems: overcome the deficiencies in the prior art, a kind of safe On line inspection system of strategy of terminaloriented computer is provided, this system can realize a central computer all terminal computers in network are concentrated on to ray examination, and checking efficiency is high.
Technical solution of the present invention: the safe On line inspection system of strategy of terminaloriented computer, on a central computer, online all terminal computers are concentrated to inspection, between all computers, by network, connect; Described system is included in ray examination instrument, package module and central computer, package module is packaged into On line inspection instrument the form of CAB and is stored on central computer, central computer embeds IE browser by CAB, and terminal computer is downloaded this CAB Auto-mounting by IE browser from central computer; Described On line inspection instrument comprises policy definition module, uniform data interface module, query analysis module, tactful internal ratio module and display module;
The condition for validity that policing type, tactful content, strategy entry-into-force time and the strategy that user checks every station terminal computer expectation by the IE browser input on central computer comes into force, and initiate tactful safe On line inspection instruction, CAB on every station terminal computer is according to the instruction start-up check receiving, specific as follows:
Uniform data interface module: receive tactful safe On line inspection instruction by IE browser, start query analysis module; And receive corresponding policing type, tactful content, strategy entry-into-force time and the tactful condition for validity coming into force and be sent to query analysis module and policy definition module from IE browser; The internal ratio result that policy mappings table, tactful internal ratio module are sent is back to central computer together with corresponding unique identification value; By central computer, passback result is gathered to demonstration;
Query analysis module: start policy definition module, according to the safe On line inspection instruction of strategy, from local computer, capture the actual value of the tactful content that in policy mappings table, policing type is corresponding, and this actual value is filled in the corresponding extension of policy mappings table simultaneously; The condition for validity that the policing type sending according to uniform data interface module, tactful content, strategy entry-into-force time and strategy come into force, to be filled into the tactful effective time of importing in corresponding policy mappings table, the condition for validity that strategy is come into force is according to corresponding strategy content, and the unique identification value corresponding with tactful content stored together;
Policy definition module: the policing type and the tactful content that send according to uniform data interface module, Establishment strategy mapping table; This policy mappings table comprises unique identification value, policing type, tactful content, strategy entry-into-force time and four contents of extension; Policing type and tactful content are one to one or the relation of one-to-many, and tactful content is the tactful inspection requirements of corresponding policing type; Extension is the actual value of corresponding strategy content, and unique identification value and tactful content, strategy entry-into-force time, extension are corresponding one by one;
Strategy internal ratio module: the strategy corresponding with the unique identification value of query analysis module stores of the extension content in the policy mappings table condition for validity that comes into force is carried out to internal ratio, display module and uniform data interface module are stored and passed to internal ratio result together with corresponding unique identification value;
Display module: receive internal ratio result and unique identification value that tactful internal ratio module sends, from policy mappings table, obtain tactful entry-into-force time corresponding to unique identification value, by within the strategy entry-into-force time and the tactful content of internal ratio erroneous results and the strategy condition for validity that comes into force on local computer, show.
The safe On line inspection instruction of strategy receiving when query analysis module is while judging whether system is provided with true CD-ROM drive, and the actual value step of the tactful content that in described crawl policy mappings table, policing type is corresponding is as follows:
(1) the safe On line inspection instruction of fetch policy, the content of operation of decision instruction, the content of operation of instruction is compared with the content of the same instruction of query analysis module acquiescence, judge that whether the two is consistent, if inconsistent, directly return to error message, wait for next tactful safe On line inspection instruction; If consistent, go to step (2);
(2) according to windows management interface WMI, obtain CD-ROM drive information, if do not obtain band CD-ROM drive information, in the corresponding extension of policy mappings table, record "No", if having, go to step (3);
(3) at least obtain the reading speed of 6 CD-ROM drives, calculating mean value; Obtain the speed reading of current hard disk, number of times with obtain the consistent of CD-ROM drive, calculating mean value; The reading speed of the CD-ROM drive relatively obtaining and the reading speed of hard disk, if error thinks that in 10MB/s this CD-ROM drive is virtual drive, think true CD-ROM drive if exceeded this scope, and comparative result is recorded in the corresponding extension of policy mappings table.
The present invention's beneficial effect is compared with prior art:
(1) system of the present invention, by checking tool being packaged into the form of CAB and embedding in IE browser, avoids at present every station terminal computer all being needed the defect of site inspection, has liberated manpower; And checking tool of the present invention is the form with mapping table by current examine item, by the policy information on real-time crawl terminal computer and mapping table related content, carry out internal ratio, can disposablely complete the project that all expectations check, and finally realize a central computer all terminal computers in network are concentrated on to ray examination, improved checking efficiency.
(2) content of policy mappings table of the present invention can contain the existing policing type of current operating system and self-defining policing type, the check process of the existing policing type complexity of current operating system is realized by internal processes, reduce the artificial input to the peculiar order of computer, reduced the specialized technical knowledge requirement to inspection personnel.For self-defined policing type, according to the requirement of network security, by capturing the current running status of computer, whether meet the requirement of computer security strategy, the general safety performance of the system of raising.
(3) grasping means of the present invention adopts the judgement from computer bottom performance, and the information that this method is obtained is difficult for forging, the lsafety level of can actual response current computer.Guaranteed the real effectiveness of On line inspection result.
Accompanying drawing explanation
Fig. 1 is the system assumption diagram of system of the present invention;
Fig. 2 is the uniform data interface module implementation procedure in system of the present invention;
Fig. 3 is the query analysis module implementation procedure in system of the present invention;
Fig. 4 is the policy definition module implementation procedure in system of the present invention;
Fig. 5 is tactful internal ratio and the display module implementation procedure in system of the present invention.
Embodiment
Below in conjunction with accompanying drawing, introduce in detail the implementation procedure of system of the present invention.Native system is concentrated inspection to all terminal computers online on a central computer, between all computers, by network, connects; Described system is included in ray examination instrument and package module, package module is packaged into On line inspection instrument the form of CAB and is stored on central computer, central computer embeds IE browser (can adopt com technology to realize embeds) by CAB, and terminal computer is downloaded this CAB Auto-mounting by IE browser from central computer; Described On line inspection instrument comprises policy definition module, uniform data interface module, query analysis module, tactful internal ratio module and display module;
System of the present invention can realize online concentrating and check and check oneself two kinds of situations, wherein, online concentrating checks: the condition for validity that policing type, tactful content, strategy entry-into-force time and the strategy that user checks every station terminal computer expectation by the IE browser input on central computer comes into force, and initiating tactful safe On line inspection instruction, the CAB on every station terminal computer is according to the instruction start-up check receiving.Check oneself: when terminal computer is checked oneself, first terminal computer initiates to check request to central computer, central computer is asked according to this, this terminal computer is initiated to tactful safe On line inspection instruction, and input policing type, tactful content, strategy entry-into-force time and the tactful condition for validity coming into force.Be implemented as follows:
(1) uniform data interface module
Uniform data interface module: as shown in Figure 2, receive tactful safe On line inspection instruction by IE browser, start query analysis module; And receive corresponding policing type, tactful content, strategy entry-into-force time and the tactful condition for validity coming into force and be sent to query analysis module and policy definition module from IE browser; The internal ratio result that policy mappings table, tactful internal ratio module are sent is back to central computer together with corresponding unique identification value; By central computer, passback result is gathered to demonstration;
Uniform data interface module is by utilizing ripe JSON technology to realize unified data-interface
(2) query analysis module
Query analysis module: as shown in Figure 3, start policy definition module, according to the safe On line inspection instruction of strategy, from local computer, capture the actual value of the tactful content that in policy mappings table, policing type is corresponding, and this actual value is filled in the corresponding extension of policy mappings table simultaneously; The condition for validity that the policing type sending according to uniform data interface module, tactful content, strategy entry-into-force time and strategy come into force, to be filled into the tactful effective time of importing in corresponding policy mappings table, the condition for validity that strategy is come into force is according to corresponding strategy content, and the unique identification value corresponding with tactful content stored together;
The procedure and contents of concrete crawl is as follows:
(1) the safe On line inspection instruction of fetch policy, the content of operation of decision instruction.
(2) according to the content of operation of instruction, capture corresponding policy information, for example judge whether system is provided with true CD-ROM drive, and method is as follows:
(2.1) content of the same instruction content of operation of instruction being set in advance with query analysis module is compared, and judges that whether the two is consistent, if inconsistent, directly returns to error message, waits for next tactful safe On line inspection instruction; If consistent, go to step (2.2);
For example, when the content of operation of instruction, judge that whether system is provided with true CD-ROM drive is strType=" CDROM ", and query analysis module acquiescence whether true CD-ROM drive command content strType=be installed " WIRELESS ", the command content of input is wrong, returns to error message.
(2.2) according to windows management interface WMI, obtain CD-ROM drive information, if do not obtain band CD-ROM drive information, in the corresponding extension of policy mappings table, record "No", if having, go to step (2.3);
(2.3) obtain the reading speed of CD-ROM drive in the time period, calculating mean value.(the minimum value that will obtain 6 times); Obtain the speed reading of current hard disk.Number of times with obtain the consistent of CD-ROM drive, calculating mean value.The reading speed of the CD-ROM drive relatively obtaining and the reading speed of hard disk, if error thinks that in 10MB/s this CD-ROM drive is virtual drive, think true CD-ROM drive if exceeded this scope, and comparative result is recorded in the corresponding extension of policy mappings table.
For example, when whether account's password is weak passwurd or account password while whether being sky, method step is as follows:
(2-1) content of the same instruction content of operation of instruction being set in advance with query analysis module is compared, and judges that whether the two is consistent, if inconsistent, directly returns to error message, waits for next tactful safe On line inspection instruction; If consistent, go to step (2-2);
For example, content of operation when instruction, judge that whether system is provided with true CD-ROM drive is strType=" EMPTYPASSWORD ", and query analysis module acquiescence whether true CD-ROM drive command content strType=be installed " ADMINACCOUNT ", the command content of input is wrong, returns to error message.
(2-2) according to Windows API (application programming interfaces), calling system login function, import null character string or weak passwurd into as " 123456 ", give login function, check that function returns results, if function returns successfully, show that account password, for empty or be weak passwurd, is recorded in comparative result in the corresponding extension of policy mappings table.If return to failure, go to step (2-3);
(2-3) obtain unsuccessfully error message, if information represents password mistake, by outcome record in the corresponding extension of policy mappings table.Otherwise calling system Modify password function, imports null character string or weak passwurd into, if successfully modified, show that account password, for empty or be weak passwurd, be recorded in comparative result in the corresponding extension of policy mappings table, otherwise return to error result.
Below other policing type in table 1 can adopt some general WMI technology to capture, concrete steps are as follows:
(1) call function CoInitializeEx is for initialization COM storehouse.
(2) call function CoInitializeSecurity is for initialization COM level of security.
(3) by calling the locator of CoCreateInstance initialization WMI
(4) call IWbemLocator::ConnectServer method, by locator, be connected to the NameSpace of WMI, by the example of an IWbemServices is passed to ConnectServer method with parametric form, create service.
(5) level of security of WMI service is set
(6) use the service obtaining before, carry out certain operations, as inquiry, call method and some other operation.
(7) releasing resource, closes and serves and be connected, and closes COM storehouse.
(8) return to the result of inquiry.
For example: judge whether to contain shared information, according to above-mentioned steps, limit initial COM storehouse, initialization level of security and locator, then be connected to the NameSpace of WMI, import parameter " Win32 Share " into; " Name ". wherein " Win32 Share " represents share service, and " Name " represents the title of query count machine share service.If result exists and returns results, if do not exist, return to null character string.And comparative result is recorded in the corresponding extension of policy mappings table.
(3) policy definition module
Policy definition module: as shown in Figure 4, the policing type and the tactful content that according to uniform data interface module, send, Establishment strategy mapping table, as shown in table 1; This policy mappings table comprises unique identification value, policing type, tactful content, strategy entry-into-force time and four contents of extension; Policing type and tactful content are one to one or the relation of one-to-many, and tactful content is the tactful inspection requirements of corresponding policing type; Extension is the actual value of corresponding strategy content, and unique identification value and tactful content, strategy entry-into-force time, extension are corresponding one by one;
Table 1 policy mappings table
Illustrate: previous section for example 1-16 item is that Establishment strategy mapping table, obtains corresponding value by the existing policing feature of collection of programs operating system according to the policing type in terminal computer operating system.Fill this corresponding content.
According to each network security requirement, user also can define oneself needs the tactful project checking, as Password Policy, audit policy etc.User is self-defined policing type as required, and the type is corresponding with corresponding actual value, is convenient to the implication that user understands each value.As above the 17-24 item in showing, tactful content is different values according to the different manifestations of policing type, as size, number of days etc.The time that strategy comes into force can dynamically be adjusted strategy as required in the whole term of validity in network system, has surpassed the term of validity just according to the strategy operation of acquiescence, guarantees that network is in certain safety protection range.
(4) tactful internal ratio module
Strategy internal ratio module as shown in Figure 5, extension content in the policy mappings table strategy corresponding with the unique identification value of the query analysis module stores condition for validity that comes into force is carried out to internal ratio, display module and uniform data interface module are stored and passed to internal ratio result together with corresponding unique identification value;
For example, for whether containing CD-ROM drive, find this unique identification value 24, the extension of query strategy mapping table, this value is " have ".According to the tactful condition for validity of this unique identification value inquiry storage, if condition for validity is " nothing ", returns to accordingly result and represent this violation.If " have ", represent that this item inspection passes through, and returns to corresponding result.
(5) display module
Display module: receive internal ratio result and unique identification value that tactful internal ratio module sends, from policy mappings table, obtain tactful entry-into-force time corresponding to unique identification value, by within the strategy entry-into-force time and the tactful content of internal ratio erroneous results and the strategy condition for validity that comes into force on local computer, show.
(6) package module
Package module is packaged into On line inspection instrument the form of CAB bag, and concrete steps are as follows:
(1) utilize makecert.exe to make digital signature
◆ enter system doc interface, the catalogue of input command cd makecert.exe, by enter key.For example: cd C:/makeCab
◆ input command, command format is as follows: makecert-sv-n-ss-r-b-e.For example: makecert-sv dsoframer.pvk-n " CN=XXXX "-ss My-r-b 01/01/1900-e01/01/9999
-sv dsoframer.pvk the meaning is to generate a private spoon file dsoframer.pvk
-n " CN=XXXX " " XXXX " is wherein exactly the proprietary name of certificate showing in signature.
-ss My specifies the certificate after generating to be kept in personal certificate
-r means that certificate is that oneself is presented to oneself.
-b 01/01/2009 specifies the term of validity from date of certificate, and form is the moon/day/year, and minimum is 1900
-e 01/01/2018 specifies the expiration of limitation period date of certificate, and form is the same.
◆ open IE " internet option ", be switched to " content " label, click " certificate " button and " choose " XXXX " be exactly the certificate generating, it, " derivation " is dsoframer.cer,
(2) set up inf file, operation IEXPRESS.EXE, choose " create new explaining by oneself and compress command file ", enter next step, choose " only creating compressed file (ActiveX installation) ", enter the DLL (if any) that next step program of using comprises routine call and be added in list, after config option, with regard to continuity point " next step ", generate dsoframer.CAB.
(3) operation signcode.exe, select dsoframer.CAB, " signature type " in " signature option " selected " self-defined (C) ", next step certificate file dsoframer.cer that above " selection from file ", the first step derives, the dsoframer.pvk file that next step the selected first step of private spoon generates again, then enter description, note, in figure " describe (optional) ": under input frame in write as required corresponding descriptive statement, click " next step ", until signed.
(4) ready-made CAB bag is embedded into webpage.
Applicating example: software of the present invention and method have been successfully applied to the online censorship process of computer of space flight institute, has been successfully completed the task of the simultaneously online censorship of more than 1000 computer.Proved that software has advantages of short, maintainable good, open interface, perfect debug function and be easy to use and manage flexibly of construction cycle.
The part that the present invention does not describe in detail belongs to techniques well known.

Claims (2)

1. the safe On line inspection method of the strategy of terminaloriented computer, is characterized in that: on a central computer, online all terminal computers are concentrated to inspection, between all computers, by network, connect; Package module is packaged into On line inspection instrument the form of CAB and is stored on central computer, and central computer embeds IE browser by CAB, and terminal computer is downloaded this CAB Auto-mounting by IE browser from central computer; Described On line inspection instrument comprises policy definition module, uniform data interface module, query analysis module, tactful internal ratio module and display module;
The condition for validity that policing type, tactful content, strategy entry-into-force time and the strategy that user checks every station terminal computer expectation by the IE browser input on central computer comes into force, and initiate tactful safe On line inspection instruction, CAB on every station terminal computer is according to the instruction start-up check receiving, specific as follows:
Uniform data interface module receives tactful safe On line inspection instruction by IE browser, starts query analysis module; And receive corresponding policing type, tactful content, strategy entry-into-force time and the tactful condition for validity coming into force and be sent to query analysis module and policy definition module from IE browser; The internal ratio result that policy mappings table, tactful internal ratio module are sent is back to central computer together with corresponding unique identification value; By central computer, passback result is gathered to demonstration;
Query analysis module starts policy definition module, according to the safe On line inspection instruction of strategy, from local computer, capture the actual value of the tactful content that in policy mappings table, policing type is corresponding, and this actual value is filled in the corresponding extension of policy mappings table simultaneously; The condition for validity that the policing type sending according to uniform data interface module, tactful content, strategy entry-into-force time and strategy come into force, to be filled into the tactful effective time of importing in corresponding policy mappings table, the condition for validity that strategy is come into force is according to corresponding strategy content, and the unique identification value corresponding with tactful content stored together;
Policing type and tactful content that policy definition module sends according to uniform data interface module, Establishment strategy mapping table; This policy mappings table comprises unique identification value, policing type, tactful content, strategy entry-into-force time and five contents of extension; Policing type and tactful content are one to one or the relation of one-to-many, and tactful content is the tactful inspection requirements of corresponding policing type; Extension is the actual value of corresponding strategy content, and unique identification value and tactful content, strategy entry-into-force time, extension are corresponding one by one;
Strategy internal ratio module is carried out internal ratio by the strategy corresponding with the unique identification value of query analysis module stores of the extension content in the policy mappings table condition for validity that comes into force, and display module and uniform data interface module are stored and passed to internal ratio result together with corresponding unique identification value;
Display module receives internal ratio result and the unique identification value that tactful internal ratio module sends, from policy mappings table, obtain tactful entry-into-force time corresponding to unique identification value, by within the strategy entry-into-force time and the tactful content of internal ratio erroneous results and the strategy condition for validity that comes into force on local computer, show.
2. the safe On line inspection method of the strategy of terminaloriented computer according to claim 1, it is characterized in that: the safe On line inspection instruction of strategy receiving when query analysis module is while judging whether system is provided with true CD-ROM drive, and the actual value step of the tactful content that in described crawl policy mappings table, policing type is corresponding is as follows:
(1) the safe On line inspection instruction of fetch policy, the content of operation of decision instruction, the content of operation of instruction is compared with the content of the same instruction of query analysis module acquiescence, judge that whether the two is consistent, if inconsistent, directly return to error message, wait for next tactful safe On line inspection instruction; If consistent, go to step (2);
(2) according to windows management interface WMI, obtain CD-ROM drive information, if do not get CD-ROM drive information, in the corresponding extension of policy mappings table, record "No", if having, go to step (3);
(3) at least obtain the reading speed of 6 CD-ROM drives, calculating mean value; Obtain the speed reading of current hard disk, number of times with obtain the consistent of CD-ROM drive, calculating mean value; The reading speed of the CD-ROM drive relatively obtaining and the reading speed of hard disk, if error thinks that in 10MB/s this CD-ROM drive is virtual drive, think true CD-ROM drive if exceeded this scope, and comparative result is recorded in the corresponding extension of policy mappings table.
CN201210099538.3A 2012-04-06 2012-04-06 Security policy online detection system facing to terminal computers Active CN102647419B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210099538.3A CN102647419B (en) 2012-04-06 2012-04-06 Security policy online detection system facing to terminal computers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210099538.3A CN102647419B (en) 2012-04-06 2012-04-06 Security policy online detection system facing to terminal computers

Publications (2)

Publication Number Publication Date
CN102647419A CN102647419A (en) 2012-08-22
CN102647419B true CN102647419B (en) 2014-08-27

Family

ID=46659994

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210099538.3A Active CN102647419B (en) 2012-04-06 2012-04-06 Security policy online detection system facing to terminal computers

Country Status (1)

Country Link
CN (1) CN102647419B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882852A (en) * 2012-09-03 2013-01-16 北京神州绿盟信息安全科技股份有限公司 Security configuration check system and method
CN106534186B (en) * 2016-12-07 2019-08-16 北京数字观星科技有限公司 A kind of remote emergency response system and its response method
CN109033840B (en) * 2018-06-28 2021-08-03 成都飞机工业(集团)有限责任公司 Method for carrying out security check on computer terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072108A (en) * 2007-07-17 2007-11-14 杭州华三通信技术有限公司 SSL VPN client end safety inspection method, system and device
CN102045353A (en) * 2010-12-13 2011-05-04 北京交通大学 Distributed network security control method of public cloud service
CN102111440A (en) * 2010-12-31 2011-06-29 深圳市永达电子股份有限公司 Real-time information safety service method and system for supporting dynamic interaction

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4197311B2 (en) * 2004-06-22 2008-12-17 インターナショナル・ビジネス・マシーンズ・コーポレーション Security policy generation method, security policy generation device, program, and recording medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072108A (en) * 2007-07-17 2007-11-14 杭州华三通信技术有限公司 SSL VPN client end safety inspection method, system and device
CN102045353A (en) * 2010-12-13 2011-05-04 北京交通大学 Distributed network security control method of public cloud service
CN102111440A (en) * 2010-12-31 2011-06-29 深圳市永达电子股份有限公司 Real-time information safety service method and system for supporting dynamic interaction

Also Published As

Publication number Publication date
CN102647419A (en) 2012-08-22

Similar Documents

Publication Publication Date Title
CN107493344B (en) Method and system for Web access to Docker container
CN110471831B (en) Automatic method and device for compatibility test
CN102663298B (en) Safety online detecting system facing to terminal computers
CN109670297B (en) Method and device for opening service permission, storage medium and electronic equipment
CN108369502A (en) The dynamic of a part as deployment/be packaged on demand
US20130014100A1 (en) Non-transitory computer readable information recording medium, log counting apparatus and package creation method
CN107332899A (en) One kind virtualization cloud computing desktop
CN104636678B (en) The method and system of management and control is carried out under a kind of cloud computing environment to terminal device
CN105872019A (en) Method and device for logging in Docker container by Web end
CN106170763B (en) A kind of software check method and apparatus
CN103500304B (en) Virtual machine personalized secure based on Xen monitors system and monitoring method
CN104298604A (en) Testing system and testing method for robustness of cloud service
CN111130922A (en) Airborne information safety automatic test method and test platform
CN105204991A (en) Internet of things test method and device
CN104702624A (en) Method and system for logging virtual machine based on Cloud Stack platform
CN114115836B (en) Design method and system of trusted TCM software stack based on Linux operating system
CN111708550A (en) Application deployment method and device, computer equipment and storage medium
CN104391697A (en) System and method for managing cloud resources of application program
CN109828924A (en) Test method, device and calculating equipment and medium
CN102647419B (en) Security policy online detection system facing to terminal computers
WO2020223365A1 (en) Zero footprint robotic process automation system
CN115686540A (en) RPA control method and system based on Hongmong system
CN107645428A (en) A kind of automatic test approach and device
CN102622550A (en) Safe online patch check system facing terminal computers
CN102571474B (en) Virtualized Radius test macro and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant