CN105939330B - Handle the method and device of local security policy configuration - Google Patents

Handle the method and device of local security policy configuration Download PDF

Info

Publication number
CN105939330B
CN105939330B CN201610079813.3A CN201610079813A CN105939330B CN 105939330 B CN105939330 B CN 105939330B CN 201610079813 A CN201610079813 A CN 201610079813A CN 105939330 B CN105939330 B CN 105939330B
Authority
CN
China
Prior art keywords
security
security key
server
key
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610079813.3A
Other languages
Chinese (zh)
Other versions
CN105939330A (en
Inventor
周守亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201610079813.3A priority Critical patent/CN105939330B/en
Publication of CN105939330A publication Critical patent/CN105939330A/en
Application granted granted Critical
Publication of CN105939330B publication Critical patent/CN105939330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides the method and device of processing local security policy configuration, which comprises obtains unique security key, unique security key indicates that the corresponding security key of different terminals is different;It is configured, generate local security policy configuration file and saved according to the secure key encryption security strategy;When accessing Intranet, the local security policy configuration file is parsed according to the security key, to obtain the security strategy configuration, and is configured according to the security strategy and carries out security inspection.Using the embodiment of the present application, the local security policy configuration efficiently avoided in terminal is divulged a secret, and is led to unsafe terminal access Intranet, is threatened to the safety of Intranet.

Description

Handle the method and device of local security policy configuration
Technical field
This application involves network communication technology fields, more particularly to the method and device of processing local security policy configuration.
Background technique
TAC (Terminal Access Control, terminal access control) solution by access Intranet (for example, Enterprise network) terminal enforce terminal security strategy configuration, effectively strengthen the automatic defense ability of terminal, avoid accessing The terminal of Intranet is dangerous, threatens to the safety of Intranet.In the prior art, terminal accesses Intranet, is passing through authentication Afterwards, it can be configured to TAC server request security strategy, and the peace that TAC server provides is encrypted by keyword key Full strategy configuration, generates local security policy configuration file and saves.Terminal parses local peace when accessing to Intranet Full policy configuration file obtains security strategy configuration, is checked according to security strategy configuration inherently safe state, example Such as, whether the system mend of itself has upgraded, and whether virus base is updated to latest edition etc..Inspection result is the terminal of safety It can access to Intranet.
However, if when the local security policy configuration file in terminal is copied in other terminals, due to each terminal On be previously provided with keyword key, and the keyword key on different terminals is all identical, therefore other terminals can also pass through Local security policy configuration file in the keyword key-parsing of itself terminal, causes the local security policy in terminal to be matched It sets and divulges a secret, for example, attacker distorts the configuration of the local security policy in terminal, so that terminal can not match according to local security policy Set the safety for accurately detecting itself, it is more likely that lead to unsafe terminal access Intranet, threaten to the safety of Intranet.
Summary of the invention
In view of this, the application provides a kind of method and device of processing local security policy configuration, to realize effectively It avoids the local security policy in terminal from configuring to divulge a secret, leads to unsafe terminal access Intranet, prestige is caused to the safety of Intranet The side of body.
Specifically, the application is achieved by the following technical solution:
According to the embodiment of the present application in a first aspect, providing the method for processing local security policy configuration, this method application At the terminal, comprising:
Unique security key is obtained, unique security key indicates the corresponding security key of different terminals respectively not It is identical;
It is configured, generate local security policy configuration file and saved according to the secure key encryption security strategy;
When accessing Intranet, the local security policy configuration file is parsed according to the security key, described in obtaining Security strategy configuration, and configured according to the security strategy and carry out security inspection.
In one embodiment, the unique security key of acquisition includes:
To the server request security key for generating the security strategy configuration, so that server generates server peace Full key, and the server security key that server is generated according to different terminals is different;
The server security key that the server returns is received, and it is described only to save the server security key conduct One security key.
In another embodiment, the unique security key of acquisition includes:
To the server request security key for generating the security strategy configuration, so that server generates server peace Full key;
Receive the server security key that the server returns;
It is identified according to the hardware attributes of the terminal, generates terminal security key;
According to preset rule of combination, new peace is generated according to the terminal security key and the server security key Full key, using the new security key as unique security key.
In another embodiment, described that the local security policy configuration file, packet are parsed according to the security key It includes:
Obtain the server security key;
According to local security policy configuration file described in the server security key-parsing.
In another embodiment, described that the local security policy configuration file, packet are parsed according to the security key It includes:
Obtain the server security key;
It is identified according to the hardware attributes of the terminal, generates terminal security key;
According to preset rule of combination, new peace is generated according to the terminal security key and the server security key Full key;
According to the new security key, the local security policy configuration file is parsed.
According to the second aspect of the embodiment of the present application, the device of processing local security policy configuration, the device application are provided At the terminal, comprising:
Acquiring unit, for obtaining unique security key, unique security key indicates that different terminals is corresponding Security key it is different;
Encryption unit generates local security policy configuration text for configuring according to the secure key encryption security strategy Part simultaneously saves;
Resolution unit, for parsing the local security policy according to the security key and configuring text when accessing Intranet Part to obtain the security strategy configuration, and configures according to the security strategy and carries out security inspection.
In one embodiment, the acquiring unit includes:
First request subelement, the server request security key for being configured to the generation security strategy, with Server is set to generate server security key, and the server security key that server is generated according to different terminals is different;
First receiving subelement, the server security key returned for receiving the server, and save the service Device security key is as unique security key.
In another embodiment, the acquiring unit includes:
Second request subelement, the server request security key for being configured to the generation security strategy, with Server is set to generate server security key;
Second receiving subelement, the server security key returned for receiving the server;
First generates subelement, for identifying according to the hardware attributes of the terminal, generates terminal security key;
First combination subelement, is used for according to preset rule of combination, according to the terminal security key and the service Device security key generates new security key, using the new security key as unique security key.
In another embodiment, the resolution unit includes:
First obtains subelement, for obtaining the server security key;
First parsing subunit, for the configuration text of the local security policy according to the server security key-parsing Part.
In another embodiment, the resolution unit includes:
Second obtains subelement, for obtaining the server security key;
Second generates subelement, for identifying according to the hardware attributes of the terminal, generates terminal security key;
Second combination subelement, for being pacified according to the terminal security key and the server according to default rule Full key generates new security key;
Second parsing subunit, for parsing the local security policy configuration file according to the new security key.
The method that the present embodiment handles local security policy configuration, by obtaining a unique security key, this is unique Security key indicate that the security key that gets of different terminals is different, use unique safe plan of secure key encryption It slightly configures, generate local security policy configuration file and saves.Since the security key of different terminals is different, even if the end Local security policy configuration file on end has been copied in other terminals, and the safety that other terminals are not available itself yet is close Key parses the local security policy configuration file, divulges a secret so as to avoid security strategy configuration, leads to unsafe terminal access Intranet is effectively guaranteed the safety of Intranet.
Detailed description of the invention
Fig. 1 illustrates the application scenarios schematic diagram that the embodiment of the present application realizes the method for processing local security policy configuration.
Fig. 2 illustrates one embodiment flow chart that the application handles the method for local security policy configuration.
Fig. 3 illustrates one that the application handles the method that local security policy configuration is saved in local security policy configuration Embodiment flow chart.
Fig. 4 illustrates one that the application handles the method for parsing local security policy configuration in local security policy configuration Embodiment flow chart.
Fig. 5 illustrates the application and handles the another of the method for saving local security policy configuration in local security policy configuration A embodiment flow chart.
Fig. 6 illustrates the application and handles the another of the method for parsing local security policy configuration in local security policy configuration A embodiment flow chart.
Fig. 7 is a kind of hardware structure diagram of terminal where the application handles the device of local security policy configuration.
Fig. 8 illustrates one embodiment block diagram that the application handles the device of local security policy configuration.
Fig. 9 illustrates another embodiment block diagram that the application handles the device of local security policy configuration.
Figure 10 illustrates another embodiment block diagram that the application handles the device of local security policy configuration.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the application.
It is only to be not intended to be limiting the application merely for for the purpose of describing particular embodiments in term used in this application. It is also intended in the application and the "an" of singular used in the attached claims, " described " and "the" including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
As IT application in enterprises office is more more and more universal, the terminal quantity of access Intranet (for example, enterprise network) is constantly increasing Add, and terminal applies increasingly complicate.In order to ensure intranet security, access control and access management need to be carried out to terminal.TAC Solution is effectively reinforced by enforcing the configuration of terminal security strategy to the terminal of access Intranet (for example, enterprise network) The automatic defense ability of terminal avoids the terminal of access Intranet dangerous, threatens to the safety of Intranet.
In order to preferably realize above-mentioned function, this application provides the methods of processing local security policy configuration.Such as Fig. 1 institute Show, illustrates the application scenarios schematic diagram that the embodiment of the present application realizes the method for processing local security policy configuration.
In Fig. 1, including TAC server 11, multiple terminals (terminal 12 as shown in Figure 1 to terminal 1n), wherein each Terminal can be configured in access Intranet after authentication to TAC server request security strategy.When terminal connects The security strategy of TAC server return is received with postponing, in order to avoid security strategy configuration is divulged a secret, for example, security strategy configures It being maliciously tampered, the security key that the available unique security key of terminal, i.e. different terminals are got is different, The security strategy configuration got is encrypted using the security key, local security policy configuration file is generated and saves. When terminal accesses to Intranet, the local security policy configuration of the preservation can be parsed by unique security key File obtains security strategy configuration, and is checked according to security strategy configuration the safe condition of itself, for example, checking Whether the system mend of itself has upgraded, whether virus base has been updated to latest edition etc..It, should when inspection result is safe The accessible Intranet of terminal, to effectively ensure the safety of Intranet.
Since terminal gets security strategy with postponing, security strategy is configured by unique security key and is encrypted, solution When analysing local security policy configuration file, it is also desirable to be parsed using unique security key, to efficiently avoid terminal Security strategy configuration divulge a secret, avoid terminal security strategy configuration is maliciously tampered so that terminal can not be according to safe plan Slightly configuration is accurate checks self-security, leads to the accessible Intranet of unsafe terminal, threatens to the safety of Intranet.
In order to be described in detail terminal is how to handle the security strategy got to configure, application as shown in connection with fig. 1 Schematic diagram of a scenario, following Fig. 2 illustrate one embodiment flow chart that the application handles the method for local security policy configuration, With a terminal therein, for example, terminal 12, for executing this method, comprising the following steps:
Step S201: obtaining unique security key, and unique security key indicates the corresponding peace of different terminals Full key is different.
As can be seen from the above description, in order to avoid the local security policy configuration in terminal is divulged a secret, terminal 12 can be to this The configuration encryption of ground security strategy.In order to realize encryption, the available security key of terminal, and the security key is unique The security key that security key, i.e. different terminals are got is different.
Step S202: configuring according to the secure key encryption security strategy, generates local security policy configuration file simultaneously It saves.
Terminal 12 is configured according to the security strategy that the secure key encryption receives, and generates local security policy configuration text Part and save process may refer to the prior art, this is no longer described in detail in the application.
Step S203: when accessing Intranet, parsing the local security policy configuration file according to the security key, with The security strategy configuration is obtained, and is configured according to the security strategy and carries out security inspection.
Local security policy is configured into encryption since terminal has passed through security key, when terminal needs to obtain local security plan When slightly configuring, the security key can be used and parse the local security policy configuration file, to obtain local security policy Configuration carries out security inspection to itself according to local security policy configuration, for example, whether to check the system mend of itself Whether upgrading, virus base have been updated to latest edition etc..When inspection result is safe, the accessible Intranet of the terminal, To effectively ensure the safety of Intranet.
The method that the present embodiment handles local security policy configuration, by obtaining a unique security key, this is unique Security key indicate that the security key that gets of different terminals is different, use unique safe plan of secure key encryption It slightly configures, generate local security policy configuration file and saves.Since the security key of different terminals is different, even if the end Local security policy configuration file on end has been copied in other terminals, and the safety that other terminals are not available itself yet is close Key parses the local security policy configuration file, divulges a secret so as to avoid security strategy configuration, leads to unsafe terminal access Intranet is effectively guaranteed the safety of Intranet.
Pass through Fig. 2 described embodiment, it can be deduced that, processing local security policy configuration can be divided into two processes: Save local security policy configuration and parsing local security policy configuration.In order to be described in more detail the application is how to handle this The configuration of ground security strategy, the process point of local security policy configuration and parsing local security policy configuration is just saved separately below It is not described in detail.
Following Fig. 3 illustrates the application and handles the side for saving local security policy configuration in local security policy configuration One embodiment flow chart of method, following Fig. 4 are illustrated in the application processing local security policy configuration and are parsed local security One embodiment flow chart of the method for strategy configuration.The Fig. 3 and Fig. 4 is based on embodiment illustrated in fig. 2.Wherein, Fig. 3 packet It includes:
The server request security key of S301: Xiang Shengcheng security strategy of step configuration, so that server generates clothes Business device security key, and the server security key that server is generated according to different terminals is different.
In the present embodiment, terminal can be to server (for example, the TAC server) request for generating security strategy configuration After the server receives request a server security key can be generated, and the server is for difference in security key The request of terminal server security key generated is different.
For example, after the server receives the request of terminal, it can be according to specification predetermined, for example, pre-defined The server security key is 8, wherein need simultaneously comprising letter and number, and letter is case sensitive, there is not allowed that Other symbols, then server can generate server security key according to the specification at random, for example, the server security generated is close Key is 1a2B3c4D.Since server security key is generated at random by server, server is different terminals generation Server security key it is different.
Step S302: the server security key that the server returns is received, and saves the server security key As unique security key.
After terminal receives the server security key of server return, the server security key can be saved, for example, It is stored in being locally configured.Since server is that the server security key that different terminals generate is not identical, terminal can Using the server security key that will receive as unique security key.
Step S303: configuring according to the secure key encryption security strategy, generates local security policy configuration file simultaneously It saves.
Terminal is configured according to the security strategy that the secure key encryption receives, and generates local security policy configuration file And the process saved may refer to the prior art, this is no longer described in detail in the application.
Fig. 4 includes:
Step S401: when accessing Intranet, the server security key of the preservation is obtained.
By step S302 it is found that terminal is saved server security key, then available server of terminal Security key.
Step S402: according to local security policy configuration file described in the server security key-parsing, to obtain Security strategy configuration is stated, and is configured according to the security strategy and carries out security inspection.
Terminal parses local security policy configuration file, and the security strategy obtained according to parsing according to the security key Configuring the process for carrying out security inspection to itself may refer to the prior art, this is no longer described in detail in the application.
The method that the present embodiment handles local security policy configuration, by being obtained to the server for generating security strategy configuration Security key, which can generate different server security keys for different terminals, so that terminal obtains one uniquely Security key, and configured using the unique secure key encryption security strategy, generate local security policy configuration file simultaneously It saves.Since the security key of different terminals is different, even if the local security policy configuration file in the terminal is replicated Onto other terminals, the security key that other terminals are not available itself yet parses the local security policy configuration file, from And avoid security strategy configuration and divulge a secret, lead to unsafe terminal access Intranet, is effectively guaranteed the safety of Intranet.
In Fig. 3 described embodiment, after terminal gets server security key, it can be saved.Due to The server security key saves at the terminal, it is likely that maliciously can be got and be distorted, there are still local security policies The risk divulged a secret.It is available safer unique in the application in order to more effectively local security policy be avoided to divulge a secret Security key, following Fig. 5 illustrate the application and handle the side for saving local security policy configuration in local security policy configuration Another embodiment flow chart of method, following Fig. 6 illustrate the application and handle the local peace of parsing in local security policy configuration Another embodiment flow chart of the method for full strategy configuration.Wherein, Fig. 5 includes:
The server request security key of S501: Xiang Shengcheng security strategy of step configuration, so that server generates clothes Business device security key.
The detailed description of this step may refer to the description in step S301, and in this not go into detail.
Step S502: the server security key that the server returns is received, and saves the server security key.
Step S503: identifying according to the hardware attributes of the terminal, generates terminal security key.
In the present embodiment, terminal is identified according to the hardware attributes of itself, such as processor flag, i.e. CPU sequence number, according to Preset generation terminal security key rule, for example, the first eight bits for taking hardware attributes to identify, generate terminal security key.Citing For, it is assumed that the CPU Serial No. BFEBFBFF000306C3 of terminal 11 takes the first eight bits 1a2B3c4D of the CPU sequence number to make For terminal security key.
It is understood that above-mentioned is only the example that terminal generates terminal security key, in actual implementation, terminal can To identify according to other hardware attributes, according to pre-set rule, terminal security key is generated.
Since there are different terminals different hardware attributes to identify, different terminals terminal security generated is close Key is also different.
Step S504: according to preset rule of combination, according to the terminal security key and the server security key New security key is generated, using the new safe code key as unique security key.
When executing the step S501 and step S502, terminal can pacify according to preset rule of combination according to the terminal Full key and the server security key generate a new security key.For example, it is assumed that server security key is 1a2B3c4D, terminal security key are 1a2B3c4D, and preset rule of combination is to take first four of terminal security key and service Latter four of device security key are combined, then the new security key generated is BFEB3c4D.
It is understood that above-mentioned is only the example that terminal generates new security key, in actual implementation, terminal is raw The rule of combination of the security key of Cheng Xin can be more complicated, and the application is without limitation.
As can be seen from the above description, the server security key that different terminals are got is different, and different terminals The terminal security key of generation is also different, then the process of different terminals as described above new security key generated Also different, then terminal can be using the new security key as unique security key.
Step S505: configuring according to the secure key encryption security strategy, generates local security policy configuration file simultaneously It saves.
Terminal is configured according to the security strategy that the secure key encryption receives, and generates local security policy configuration file And the process saved may refer to the prior art, this is no longer described in detail in the application.
Fig. 6 includes:
Step S601: when accessing Intranet, the server security key of the preservation is obtained.
The detailed description of this step may refer to the associated description in above-mentioned steps S401, and in this not go into detail.
Step S602: identifying according to the hardware attributes of the terminal, generates terminal security key.
In this step, terminal can according to the description in step S502, take with rule identical in step S502, according to Identical hardware attributes mark, generates terminal security key.
Step S603: according to preset rule of combination, according to the terminal security key and the server security key Generate new security key.
In this step, terminal can according to the description in step S503, take with rule of combination identical in step S503, Server security key and terminal security key are combined, new security key is generated.
Since the new security key is generated by terminal security key and server security cipher key combinations, even if server Security key is possible to maliciously to be obtained and be distorted, but terminal security key is to be identified to give birth to according to the hardware attributes of terminal itself At attacker is difficult to determine that terminal security key is generated according to which hardware attributes mark, so that attacker is difficult to get Terminal security key, to be difficult to get the unique security key ultimately generated.
Step S604: the local security policy configuration file is parsed according to the new security key, described in obtaining Security strategy configuration, and configured according to the security strategy and carry out security inspection.
Terminal parses local security policy configuration file, and the security strategy obtained according to parsing according to the security key Configuring the process for carrying out security inspection to itself may refer to the prior art, this is no longer described in detail in the application.
The method that the present embodiment handles local security policy configuration, by using the server security key got and certainly The terminal security key of body generates final unique security key, and is matched using unique secure key encryption security strategy It sets, generate local security policy configuration file and saves.When parsing local security policy configuration, still need to obtain the clothes saved Business device security key, and terminal security key is generated, new security key is ultimately generated according to the rwo, uses the new safety Key just can parse local security policy configuration file, get security strategy configuration.Even if server security key may It is got by attacker's malice, attacker is also difficult to get terminal security key, to be difficult to get final unique Security key divulges a secret to efficiently avoid security strategy configuration, leads to unsafe terminal access Intranet, effectively guarantee The safety of Intranet.
In addition, the server security key that server is returned to different terminals can also be identical, due to not in the present embodiment The terminal security key generated with terminal itself is not identical, even if server security key is identical, by server security key After being combined with terminal security key, new security key generated also can be different.
Corresponding with the embodiment of method of aforementioned processing local security policy configuration, it is local that present invention also provides processing The embodiment of the device of security strategy configuration.
The embodiment that the application handles the device of local security policy configuration can be using at the terminal.Installation practice can Can also be realized by way of hardware or software and hardware combining by software realization.Taking software implementation as an example, as one Device on logical meaning is to be referred to computer program corresponding in nonvolatile memory by the processor of terminal where it It enables and is read into memory what operation was formed.For hardware view, match as shown in fig. 7, handling local security policy for the application A kind of hardware structure diagram of terminal where the device set, in addition to processor 71 shown in Fig. 7, memory 72, network interface 73 and Except nonvolatile memory 74, the terminal in embodiment where device can also be wrapped generally according to the actual functional capability of the terminal Other hardware are included, this is repeated no more.
Referring to FIG. 8, one embodiment block diagram that the application handles the device of local security policy configuration is illustrated, it is described Device may include: acquiring unit 81, encryption unit 82, resolution unit 83.
Wherein, the acquiring unit 81, can be used for obtaining unique security key, and unique security key indicates The corresponding security key of different terminals is different;
The encryption unit 82 can be used for being configured according to the secure key encryption security strategy, generate local security Policy configuration file simultaneously saves;
The resolution unit 83 can be used for when accessing Intranet, parse the local security according to the security key Policy configuration file to obtain the security strategy configuration, and configures according to the security strategy and carries out security inspection.
Referring to FIG. 9, another embodiment block diagram that the application handles the device of local security policy configuration is illustrated, it should Device shown in Fig. 9 is on the basis of above-mentioned Fig. 8 shown device, the acquiring unit 81, may include: the first request subelement 811, the first receiving subelement 812.
The first request subelement 811 can be used for the server request for generating the security strategy configuration Security key, so that server generates server security key, and the server security that server is generated according to different terminals is close Key is different;
First receiving subelement 812 can be used for receiving the server security key that the server returns, and protect The server security key is deposited as unique security key.
The resolution unit 83 may include: the first acquisition subelement 831, the first parsing subunit 832.
Wherein, described first subelement 831 is obtained, can be used for obtaining the server security key;
First parsing subunit 832 can be used for the local security according to the server security key-parsing Policy configuration file.
Referring to FIG. 10, another embodiment block diagram that the application handles the device of local security policy configuration is illustrated, The device shown in Fig. 9 is on the basis of above-mentioned Fig. 7 shown device, the acquiring unit 81, may include: that the second request is single First 813, second receiving subelement 814, first generates subelement 815, first and combines subelement 816.
Wherein, the second request subelement 813 can be used for the server request for generating the security strategy configuration Security key is obtained, so that server generates server security key;
Second receiving subelement 814 can be used for receiving the server security key that the server returns;
Described first generates subelement 815, can be used for being identified according to the hardware attributes of the terminal, generates terminal security Key;
The first combination subelement 816, can be used for according to preset rule of combination, according to the terminal security key New security key is generated with the server security key, the new safe code key is secret as unique safety Key.
The resolution unit 83 may include: that the second acquisition subelement 833, second generates the combination of subelement 834, second Subelement 835, the second parsing subunit 836.
Wherein, described second subelement 833 is obtained, can be used for obtaining the server security key;
Described second generates subelement 834, can be used for being identified according to the hardware attributes of the terminal, generates terminal security Key;
The second combination subelement 835, can be used for according to default rule, according to the terminal security key and institute It states server security key and generates new security key;
Second parsing subunit 836 can be used for parsing the local security plan according to the new security key Slightly configuration file.
The function of each unit and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize application scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
The foregoing is merely the preferred embodiments of the application, not to limit the application, all essences in the application Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the application protection.

Claims (8)

1. a kind of method of processing local security policy configuration, which is characterized in that the method is applied at the terminal, the method Include:
After the terminal is by authentication, unique security key is obtained, unique security key indicates different The corresponding security key of terminal it is different, wherein it is described to obtain unique security key and include:
To the server request security key for generating the security strategy configuration, so that server generation server security is close Key, and the server security key that server is generated according to different terminals is different;
The server security key that the server returns is received, and saves the server security key as described unique Security key;
It is configured, generate local security policy configuration file and saved according to the secure key encryption security strategy;
When accessing Intranet, the local security policy configuration file is parsed according to the security key, to obtain the safety Strategy configuration, and configured according to the security strategy and carry out security inspection.
2. the method according to claim 1, wherein the unique security key of acquisition includes:
To the server request security key for generating the security strategy configuration, so that server generation server security is close Key;
Receive the server security key that the server returns;
It is identified according to the hardware attributes of the terminal, generates terminal security key;
According to preset rule of combination, it is close that new safety with the server security key is generated according to the terminal security key Key, using the new security key as unique security key.
3. the method according to claim 1, wherein described parse the local security according to the security key Policy configuration file, comprising:
Obtain the server security key;
According to local security policy configuration file described in the server security key-parsing.
4. according to the method described in claim 2, it is characterized in that, described parse the local security according to the security key Policy configuration file, comprising:
Obtain the server security key;
It is identified according to the hardware attributes of the terminal, generates terminal security key;
According to preset rule of combination, it is close that new safety with the server security key is generated according to the terminal security key Key;
According to the new security key, the local security policy configuration file is parsed.
5. a kind of device of processing local security policy configuration, which is characterized in that described device is applied at the terminal, described device Include:
Acquiring unit, for obtaining unique security key, unique safety after the terminal is by authentication Key indicates that the corresponding security key of different terminals is different, wherein the acquiring unit includes:
First request subelement, the server request security key for being configured to the generation security strategy, so that clothes Business device generates server security key, and the server security key that server is generated according to different terminals is different;
First receiving subelement, the server security key returned for receiving the server, and save the server peace Full key is as unique security key;
Encryption unit generates local security policy configuration file simultaneously for configuring according to the secure key encryption security strategy It saves;
Resolution unit, for parsing the local security policy configuration file according to the security key when accessing Intranet, with The security strategy configuration is obtained, and is configured according to the security strategy and carries out security inspection.
6. device according to claim 5, which is characterized in that the acquiring unit includes:
Second request subelement, the server request security key for being configured to the generation security strategy, so that clothes Business device generates server security key;
Second receiving subelement, the server security key returned for receiving the server;
First generates subelement, for identifying according to the hardware attributes of the terminal, generates terminal security key;
First combination subelement, for being pacified according to the terminal security key and the server according to preset rule of combination Full key generates new security key, using the new security key as unique security key.
7. device according to claim 5, which is characterized in that the resolution unit includes:
First obtains subelement, for obtaining the server security key;
First parsing subunit is used for the local security policy configuration file according to the server security key-parsing.
8. device according to claim 6, which is characterized in that the resolution unit includes:
Second obtains subelement, for obtaining the server security key;
Second generates subelement, for identifying according to the hardware attributes of the terminal, generates terminal security key;
Second combination subelement, is used for according to default rule, close according to the terminal security key and the server security Key generates new security key;
Second parsing subunit, for parsing the local security policy configuration file according to the new security key.
CN201610079813.3A 2016-02-04 2016-02-04 Handle the method and device of local security policy configuration Active CN105939330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610079813.3A CN105939330B (en) 2016-02-04 2016-02-04 Handle the method and device of local security policy configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610079813.3A CN105939330B (en) 2016-02-04 2016-02-04 Handle the method and device of local security policy configuration

Publications (2)

Publication Number Publication Date
CN105939330A CN105939330A (en) 2016-09-14
CN105939330B true CN105939330B (en) 2019-07-09

Family

ID=57152925

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610079813.3A Active CN105939330B (en) 2016-02-04 2016-02-04 Handle the method and device of local security policy configuration

Country Status (1)

Country Link
CN (1) CN105939330B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107547499A (en) * 2017-05-11 2018-01-05 新华三信息安全技术有限公司 Feature database collocation method and device
CN113032740A (en) * 2021-05-27 2021-06-25 中国电力科学研究院有限公司 Energy control terminal policy file security reinforcement method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102812684A (en) * 2010-01-11 2012-12-05 森特里克斯信息安全技术有限公司 System and method of enforcing a computer policy
EP2573701A1 (en) * 2011-09-23 2013-03-27 Samsung SDS Co., Ltd. Mobile device management apparatus and method based on security policies and management server for mobile device management
CN103873462A (en) * 2014-02-14 2014-06-18 中国南方电网有限责任公司 IEC62351-based security configuration verification method for IED schema file and IED configuration file
CN103944890A (en) * 2014-04-08 2014-07-23 山东乾云启创信息科技有限公司 Virtual interaction system and method based on client/server mode
CN105049447A (en) * 2015-08-21 2015-11-11 北京洋浦伟业科技发展有限公司 Security policy configuration system based on big data analysis
CN105141593A (en) * 2015-08-10 2015-12-09 刘澄宇 Private cloud platform secure computation method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102812684A (en) * 2010-01-11 2012-12-05 森特里克斯信息安全技术有限公司 System and method of enforcing a computer policy
EP2573701A1 (en) * 2011-09-23 2013-03-27 Samsung SDS Co., Ltd. Mobile device management apparatus and method based on security policies and management server for mobile device management
CN103873462A (en) * 2014-02-14 2014-06-18 中国南方电网有限责任公司 IEC62351-based security configuration verification method for IED schema file and IED configuration file
CN103944890A (en) * 2014-04-08 2014-07-23 山东乾云启创信息科技有限公司 Virtual interaction system and method based on client/server mode
CN105141593A (en) * 2015-08-10 2015-12-09 刘澄宇 Private cloud platform secure computation method
CN105049447A (en) * 2015-08-21 2015-11-11 北京洋浦伟业科技发展有限公司 Security policy configuration system based on big data analysis

Also Published As

Publication number Publication date
CN105939330A (en) 2016-09-14

Similar Documents

Publication Publication Date Title
JP7162350B2 (en) core network access provider
US8572400B2 (en) Enhanced digital right management framework
US11829469B2 (en) Software integrity checking systems and methods
KR102396643B1 (en) API and encryption key secret management system and method
CN110651261A (en) Secure memory device with unique identifier for authentication
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
US10375084B2 (en) Methods and apparatuses for improved network communication using a message integrity secure token
WO2021012978A1 (en) Method, apparatus and device for detecting hardware, and storage medium
WO2018112482A1 (en) Method and system for distributing attestation key and certificate in trusted computing
CN105939330B (en) Handle the method and device of local security policy configuration
US9245097B2 (en) Systems and methods for locking an application to device without storing device information on server
JP6253168B2 (en) Improved tamper resistance of aggregated data
Zachos Securing J1939 communications using strong encryption with FIPS 140-2
Ballesteros et al. RATS Working Group G. Mandyam Internet-Draft Qualcomm Technologies Inc. Intended status: Standards Track L. Lundblade Expires: September 25, 2019 Security Theory LLC
Ballesteros et al. RATS Working Group G. Mandyam Internet-Draft Qualcomm Technologies Inc. Intended status: Standards Track L. Lundblade Expires: December 24, 2019 Security Theory LLC
Ballesteros et al. Network Working Group G. Mandyam Internet-Draft Qualcomm Technologies Inc. Intended status: Standards Track L. Lundblade Expires: May 23, 2019 Security Theory LLC
Ballesteros et al. RATS Working Group G. Mandyam Internet-Draft Qualcomm Technologies Inc. Intended status: Standards Track L. Lundblade Expires: January 5, 2020 Security Theory LLC
Ballesteros et al. RATS Working Group G. Mandyam Internet-Draft Qualcomm Technologies Inc. Intended status: Standards Track L. Lundblade Expires: August 23, 2020 Security Theory LLC
Arora et al. A Comprehensive Model to Enhance Performance of WS-Security Processing
CN117749356A (en) Virtual machine communication method, device, computer equipment and storage medium
Niszl A cryptographic concept for the secure storage and transmission of medical images on iOS devices
CN116743460A (en) Data exchange isolation method, system, equipment and storage medium for internal and external network
CN117061099A (en) Data interaction method, device, electronic equipment and readable medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building

Applicant after: Hangzhou Dipu Polytron Technologies Inc

Address before: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building

Applicant before: Hangzhou Dipu Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant