CN107231378A - A kind of security control method based on electric power mobile office equipment, apparatus and system - Google Patents

A kind of security control method based on electric power mobile office equipment, apparatus and system Download PDF

Info

Publication number
CN107231378A
CN107231378A CN201710600683.8A CN201710600683A CN107231378A CN 107231378 A CN107231378 A CN 107231378A CN 201710600683 A CN201710600683 A CN 201710600683A CN 107231378 A CN107231378 A CN 107231378A
Authority
CN
China
Prior art keywords
instruction
mobile
mobile terminal
management
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710600683.8A
Other languages
Chinese (zh)
Inventor
杭菲璐
欧玮
李申章
郭威
廖莹璐
李寒箬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Center of Yunnan Power Grid Co Ltd
Original Assignee
Information Center of Yunnan Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Center of Yunnan Power Grid Co Ltd filed Critical Information Center of Yunnan Power Grid Co Ltd
Priority to CN201710600683.8A priority Critical patent/CN107231378A/en
Publication of CN107231378A publication Critical patent/CN107231378A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of security control method based on electric power mobile office equipment, device its system.Wherein, methods described includes:Management instruction is sent into mobile terminal, wherein, the management instruction includes monitoring of tools instruction and device security policy execute instruction;If the management instruction is monitoring of tools instruction, SDK interfaces are called to carry out security monitoring;Receive monitoring information of the mobile terminal according to the monitoring instruction feedback;If the management instruction is device security policy execute instruction, the mobile terminal is controlled to perform the device security policy execute instruction.The application effectively solves the safety of electric power mobile office equipment, and the electric power mobile office equipment of management and control in real time.

Description

A kind of security control method based on electric power mobile office equipment, apparatus and system
Technical field
The application is related to power domain, more particularly to a kind of security control method based on electric power mobile office equipment, dress Put and system.
Background technology
Electrical power services play key player, electric power enterprise in daily life as an infrastructure service of the relation people's livelihood Also a straight grip power information is used as the most important thing in work to industry.Informatization is also from fixed desktop end to movement The development of hand-held extreme direction, through construction in a few years, the application of the mobile terminals of various functional areas has begun to take shape, and mobile office is also As the indispensable part of routine office work, but the application installed with mobile terminal is more and more.
Uneven and different between the single equipment hardware environment of independent utility development quality also gives mobile office band The challenge in terms of security is carried out, although access at present is electric power enterprise Intranet, the data and business accessed are not belonging to Enterprise key, therefore by slave unit end, to the bursting tube of the complete sets such as network transmission, remote control and backstage security monitoring Control system, while mobile office brings convenient, also solves significant portion of safety issue, is that grid company enterprise moves The development of dynamic application provides security guarantee.
The content of the invention
This application provides a kind of security control method based on electric power mobile office equipment, apparatus and system, to solve The safety issue of electric power mobile office.
In a first aspect, this application provides a kind of security control method based on electric power mobile office equipment, methods described Apply on main control computer, methods described includes:
Management instruction is sent into mobile terminal, wherein, the management instruction includes monitoring of tools instruction and equipment safety Strategy execution is instructed;
If the management instruction is monitoring of tools instruction, SDK interfaces are called to carry out security monitoring;
Receive monitoring information of the mobile terminal according to the monitoring instruction feedback;
If the management instruction is device security policy execute instruction, the mobile terminal is controlled to perform the equipment Security strategy execute instruction.
Second aspect, present invention also provides a kind of security management and control device based on electric power mobile office equipment, its feature It is, including management instruction sending module and information receiving module, wherein:
The management instruction sending module, for sending management instruction into mobile terminal, wherein, the management instruction bag Include monitoring of tools instruction and device security policy execute instruction;
Security monitoring module, if being monitoring of tools instruction for the management instruction, calls SDK interfaces to carry out safety Monitoring;
Receiving module, the monitoring information sent for mobile terminal described in real-time reception;
Control module, if being device security policy execute instruction for the instruction, controls the mobile terminal to hold The row device security policy execute instruction.
The third aspect, present invention also provides a kind of security management and control system based on electric power mobile office equipment, its feature It is, including:Main control computer, mobile management platform, Mobile solution shop and mobile terminal, wherein:
The main control computer is connected by 4A platforms with the mobile management Platform communication;
The mobile management platform is connected by intranet and extranet switching plane with the Mobile solution shop;
The main control computer is connected by VPN and mobile management platform with the communication of mobile terminal.
Security control method disclosed in the present application based on electric power mobile office equipment, in apparatus and system, bonding apparatus Safely, these technical advantages are monitored using safety, data safety, operation, the protrusion occurred in being handled official business for current electric power mobile Problem is optimized and improved:To greatest extent ensure the business of grid power mobile office My Perspective On The Co-building and mobile office and Strong technological means is provided in terms of Information Security.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme of the application, letter will be made to the required accompanying drawing used in embodiment below Singly introduce, it should be apparent that, for those of ordinary skills, without having to pay creative labor, Other accompanying drawings can also be obtained according to these accompanying drawings.
A kind of flow for security control method based on electric power mobile office equipment that Fig. 1 provides for the embodiment of the present application is shown It is intended to;
The flow for another security control method based on electric power mobile office equipment that Fig. 2 provides for the embodiment of the present application Figure;
A kind of security management and control apparatus structure signal based on electric power mobile office equipment that Fig. 3 provides for the embodiment of the present application Figure;
Fig. 4 shows for another security management and control apparatus structure based on electric power mobile office equipment that the embodiment of the present application is provided It is intended to.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
This method is absorbed in using mobile device safety management (MDM), mobile application security management (MAM), mobile data A variety of security protections and the safety management means such as safety management (MCM), mobile subscriber's safety management and Mobile solution operation monitoring, Mobile security control platform is built in terms of terminal, network, three, platform, safe and reliable, economic and practical mobile security is realized Management and control function.
Referring to Fig. 1, a kind of security control method based on electric power mobile office equipment provided for the embodiment of the present application Schematic flow sheet.
In step S101, management instruction is sent into mobile terminal, wherein, the management instruction includes monitoring of tools and referred to Order and device security policy execute instruction;
The method that the embodiment of the present application is provided applies the master control in the security management and control system based on electric power mobile office equipment In machine, when mobile terminal application enters Intranet, user accesses 4A (Authentication using PC computers insertion Ukey Account Authorization Audit, unified security management platform solution) door, pass through single-point in 4A doors The self-service certificate request interface for opening mobile access-in management platform is logged in, VPN (Virtual Private are called first Network, VPN) interface checking VPN it is whether open-minded, afterwards by interface apply certificate granting code when call PKI/ CA mobile certificate application interface.
When mobile terminal has certificate, VPN is logged in by mobile certificate, and call PKI/CA (Public Key Infrastructure, PKIX;Certificate Authority, authentication center) certification authentication interface checking Certificate validity.After User logs in success, by VPN passage portal entry APP homepages, and Mobile solution management interface is called to obtain Take the authority using store information and active user.User's promoter application from door APP, sub- application passes through Mobile solution pipe Reason obtains subscriber identity information and authority, reconnects container cloud and obtains corresponding service, such as service content is needed from operation system Middle acquisition then needs to connect operation system by container cloud.4A data are mobile by interface synchronization to mobile terminal access-in management Terminal access resynchronisation data are managed to Mobile solution.
Mobile access-in management platform issues administration order, and order carries out data ferry-boat, ferry-boat by intranet and extranet switching plane To DMZ areas Mobile solution shop, Mobile solution shop pushes that command mode is different for different clients, and IOS clients are led to The APNS server push for crossing apple is sent to each client, and android clients then push order to each by the individual platform that is bulldozed Client.
In step s 102, if management instruction is monitoring of tools instruction, SDK interfaces are called to carry out security monitoring.
SDK (Software Development Kit, SDK) interface is provided in system for being set Standby monitoring.User each can be connected to the mobile terminal of Intranet by master control machine monitoring, when needing to monitor or check some During mobile terminal, just it can be monitored by main control computer.
Monitoring of tools instruction is an instruction monitored in real time, can monitor in real time mobile terminal flow, using, equipment, User and abnormality alarming.Mobile terminal feeds back above-mentioned monitoring information to main control computer in real time.
In step s 103, monitoring information of the mobile terminal according to monitoring instruction feedback is received.
Real-time or periodic receipt mobile terminal can include movement according to the monitoring information for monitoring instruction feedback, monitoring information The use flow of terminal, using information such as running situation, the running situation of equipment, User logs in and abnormality alarmings.According to movement The monitoring information of terminal feedback determines the service condition of mobile terminal, so as to play purpose and the effect of monitoring.
When sending monitoring instruction, instruction is encrypted, and prevents instruction to be tampered in transmitting procedure.
In step S104, if the management instruction is device security policy execute instruction, control described mobile whole End performs the device security policy execute instruction.
If it is device security policy execute instruction to manage instruction, obtains and send security strategy execute instruction to mobile whole End, control mobile terminal performs device security policy instruction instruction.Device security policy execute instruction is used to control mobile terminal No photographing, forbid screenshotss and issue the mark and password of Intranet, mobile terminal is according to the mark and password of the Intranet issued It is connected to Intranet.Main control computer sets the screen-lock password of mobile terminal, and predeterminable screen-lock password is device identification, prevents the third party from making With.
When transmitting data, main control computer is retransmited to mobile terminal after internal data is compressed and encrypted, and prevents number According to being tampered or intercept in transmitting procedure.In addition, internal data is by sandbox isolation technology, by internal data store in safety In sandbox, it is impossible to had access to by the Mobile solution of non-in-house network, and data carry out encryption storage, even if mobile terminal is cracked Or escape from prison, the data file of copy can not also be checked.
The main data to enterprise mobile application are encrypted and isolation processing in the embodiment of the present application, the file of data storage Exclusive by electric power mobile application, enterprise's application can not be accessed, meanwhile, using the file after RSA+AES double-encryptions, only make Data content therein can be just read with specific manner of decryption, Information Security is fully ensured.
Referring to Fig. 2, another security control method based on electric power mobile office equipment provided for the embodiment of the present application Schematic flow sheet.
In step S105, mobile management platform is accessed, and call VPN interfaces.
In step s 106, if VPN interfaces are open-minded, PKI/CA mobile certificate application interface is called.
In step s 107, application certificate granting code is obtained, and the moving tube is logged according to application certificate granting code Platform.
The method that the embodiment of the present application is provided is applied to main control computer and sets up the process being connected with mobile terminal, and main control computer is , it is necessary to access mobile management platform first when mobile terminal sets up connection, and call VPN interfaces.If VPN interfaces are open-minded, PKI/CA mobile certificate application interface is then called, application certificate granting code is obtained, is logged in and moved according to application certificate granting code Management platform.
The embodiment of the present application is directed to the problem of Intranet application and Information Security are lacked in current electric power mobile office process, Supplement optimization and improvement are carried out, slave unit security, application security, Information Security and several broad aspects of monitoring are started with, to move While dynamic office brings convenient, significant portion of safety issue is also solved, is the hair of grid company enterprise mobile application Exhibition provides security guarantee.
Referring to Fig. 3, a kind of security management and control device knot based on electric power mobile office equipment provided for the embodiment of the present application Structure schematic diagram.
As shown in figure 3, the security management and control device based on electric power mobile office equipment includes management instruction sending module and letter Receiving module is ceased, wherein:Instruction sending module is managed, management instruction is sent into mobile terminal, wherein, management instruction includes setting Standby monitoring instruction and device security policy execute instruction.Security monitoring module, if being monitoring of tools instruction for managing instruction, SDK interfaces are then called to carry out security monitoring;Receiving module is used for the monitoring information that mobile terminal described in real-time reception is sent.Control If it is device security policy execute instruction that module, which is used to instruct, the mobile terminal is controlled to perform the device security policy Execute instruction.
Control module include disabled module, disabled module be used for control the mobile terminal no photographing, forbid screenshotss with And the mark and password of Intranet are issued, control the mobile terminal to connect Intranet automatically.
Control module also includes encrypting module and isolation module;When encrypting module is used to transmit data, internal data is compressed And sent after encrypting to the mobile terminal;Isolation module is used to isolate internal data and encrypt storage.
Referring to Fig. 4, another security management and control device based on electric power mobile office equipment provided for the embodiment of the present application Structural representation.
As shown in figure 4, the security management and control device of electric power mobile office equipment also includes AM access module, calling module and login Module;AM access module is used to access mobile management platform, and calls VPN interfaces;If calling module is used for the VPN interfaces It is open-minded, then call PKI/CA mobile certificate application interface;Login module applies for certificate granting code for obtaining, and according to The application certificate granting code logs in the mobile management platform.
Seen from the above description, the device that the embodiment of the present application is provided mainly is encrypted and isolated to inside data of enterprise Processing, slave unit is safe, start with using safety, data safety and monitoring, while being that mobile office brings convenient, it is ensured that it is pacified Quan Xing.
The embodiment of the present application additionally provides a kind of security management and control system based on electric power mobile office equipment, including:Master control Machine, mobile management platform, Mobile solution shop and mobile terminal, wherein:Main control computer is patted by 4A platforms with the moving tube Platform is communicated to connect;Mobile management platform is connected by intranet and extranet switching plane with the Mobile solution shop;Main control computer passes through VPN And mobile management platform is connected with the communication of mobile terminal.
Those skilled in the art will readily occur to its of the present invention after the disclosure that specification and practice are invented here is considered Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or Person's adaptations follow the general principle of the present invention and including undocumented common knowledge in the art of the invention Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (10)

1. a kind of security control method based on electric power mobile office equipment, methods described is applied on main control computer, its feature exists In methods described includes:
Management instruction is sent into mobile terminal, wherein, the management instruction includes monitoring of tools instruction and device security policy Execute instruction;
If the management instruction is monitoring of tools instruction, SDK SDK interfaces are called to carry out security monitoring;
Receive monitoring information of the mobile terminal according to the monitoring instruction feedback;
If the management instruction is device security policy execute instruction, the mobile terminal is controlled to perform the equipment safety Strategy execution is instructed.
2. according to the method described in claim 1, it is characterised in that if the management instruction is that device security policy is held Row instruction, then control the mobile terminal to perform the device security policy execute instruction, including:
The mobile terminal no photographing is controlled, forbid screenshotss and issues the mark and password of Intranet, is controlled described mobile whole The automatic connection Intranet in end.
3. according to the method described in claim 1, it is characterised in that if the management instruction is that device security policy is held Row instruction, then control the mobile terminal to perform the device security policy execute instruction, including:
When transmitting data, compress internal data and sent after encrypting to the mobile terminal;
Internal data is isolated and storage is encrypted.
4. according to the method described in claim 1, it is characterised in that the monitoring information includes:Facility information, equipment safety letter Breath and operation information.
5. according to the method described in claim 1, it is characterised in that methods described also includes:
Mobile management platform is accessed, and calls VPN VPN interfaces;
If the VPN interfaces are open-minded, PKIX PKI/CA mobile certificate application interface is called;
Application certificate granting code is obtained, and the mobile management platform is logged according to the application certificate granting code.
6. a kind of security management and control device based on electric power mobile office equipment, it is characterised in that including management instruction sending module And information receiving module, wherein:
The management instruction sending module, for sending management instruction into mobile terminal, wherein, the management instruction includes setting Standby monitoring instruction and device security policy execute instruction;
Security monitoring module, if being monitoring of tools instruction for the management instruction, calls SDK interfaces to carry out safe prison Control;
Receiving module, the monitoring information sent for mobile terminal described in real-time reception;
Control module, if being device security policy execute instruction for the instruction, controls the mobile terminal to perform institute State device security policy execute instruction.
7. device according to claim 6, it is characterised in that the control module includes:Disabled module;
The disabled module, for controlling the mobile terminal no photographing, forbids screenshotss and issues the mark of Intranet and close Code, controls the mobile terminal to connect Intranet automatically.
8. device according to claim 6, it is characterised in that the control module includes:Encrypting module and isolation module;
The encrypting module, for transmitting during data, compresses internal data and is sent after encrypting to the mobile terminal;
The isolation module, for being isolated internal data and encrypting storage.
9. device according to claim 6, it is characterised in that described device also includes AM access module, calling module and stepped on Record module;
The AM access module, for accessing mobile management platform, and calls VPN interfaces;
The calling module, if open-minded for the VPN interfaces, calls PKI/CA mobile certificate application interface;
The login module, described move is logged in for obtaining application certificate granting code, and according to the application certificate granting code Dynamic management platform.
10. a kind of security management and control system based on electric power mobile office equipment, it is characterised in that including:Main control computer, mobile management Platform, Mobile solution shop and mobile terminal, wherein:
The main control computer is connected by 4A platforms with the mobile management Platform communication;
The mobile management platform is connected by intranet and extranet switching plane with the Mobile solution shop;
The main control computer is connected by VPN and mobile management platform with the communication of mobile terminal.
CN201710600683.8A 2017-07-21 2017-07-21 A kind of security control method based on electric power mobile office equipment, apparatus and system Pending CN107231378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710600683.8A CN107231378A (en) 2017-07-21 2017-07-21 A kind of security control method based on electric power mobile office equipment, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710600683.8A CN107231378A (en) 2017-07-21 2017-07-21 A kind of security control method based on electric power mobile office equipment, apparatus and system

Publications (1)

Publication Number Publication Date
CN107231378A true CN107231378A (en) 2017-10-03

Family

ID=59956127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710600683.8A Pending CN107231378A (en) 2017-07-21 2017-07-21 A kind of security control method based on electric power mobile office equipment, apparatus and system

Country Status (1)

Country Link
CN (1) CN107231378A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632807A (en) * 2018-05-03 2018-10-09 平安科技(深圳)有限公司 The method and device of mobile terminal accessing control
CN109587181A (en) * 2019-01-29 2019-04-05 公安部第研究所 A method of single-sign-on assets are realized based on two dimensional code identification authentication mode
CN112527205A (en) * 2020-12-16 2021-03-19 江苏国科微电子有限公司 Data security protection method, device, equipment and medium
CN115618435A (en) * 2022-10-28 2023-01-17 长江量子(武汉)科技有限公司 File control method applied to office equipment and office equipment

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605066A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 Telecommunication network behavior method for real-time monitoring based on multilayer data interception
CN102271157A (en) * 2011-07-21 2011-12-07 深圳市中兴新通讯设备有限公司 Power monitoring system, method, wireless fidelity (WIFI) transceiver and intelligent power equipment
CN102868750A (en) * 2012-09-20 2013-01-09 无锡华御信息技术有限公司 Monitoring and management system of information processing equipment
US20140006347A1 (en) * 2011-10-11 2014-01-02 Zenprise, Inc. Secure container for protecting enterprise data on a mobile device
CN103716785A (en) * 2013-12-26 2014-04-09 中国科学院信息工程研究所 Mobile Internet security service system
CN104184735A (en) * 2014-08-26 2014-12-03 国家电网公司 Electric marketing mobile application safe protection system
CN104424317A (en) * 2013-09-06 2015-03-18 中国移动通信集团四川有限公司 Method and system for providing application for user terminal
CN105007304A (en) * 2015-06-09 2015-10-28 王一磊 SOA-based enterprise information technology system data exchange and integration system
CN105307135A (en) * 2014-07-24 2016-02-03 芯讯通无线科技(上海)有限公司 Mobile terminal and information protection method thereof
CN106162538A (en) * 2015-03-19 2016-11-23 孙夫雄 Long distance control system and method for mobile terminal
CN106411939A (en) * 2016-11-21 2017-02-15 国网四川省电力公司信息通信公司 Enterprise information intranet WI-FI access security reinforcing authentication method
CN106779265A (en) * 2015-11-19 2017-05-31 国网智能电网研究院 One kind is based on electric intelligent mobile terminal presence safety detecting method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605066A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 Telecommunication network behavior method for real-time monitoring based on multilayer data interception
CN102271157A (en) * 2011-07-21 2011-12-07 深圳市中兴新通讯设备有限公司 Power monitoring system, method, wireless fidelity (WIFI) transceiver and intelligent power equipment
US20140006347A1 (en) * 2011-10-11 2014-01-02 Zenprise, Inc. Secure container for protecting enterprise data on a mobile device
CN102868750A (en) * 2012-09-20 2013-01-09 无锡华御信息技术有限公司 Monitoring and management system of information processing equipment
CN104424317A (en) * 2013-09-06 2015-03-18 中国移动通信集团四川有限公司 Method and system for providing application for user terminal
CN103716785A (en) * 2013-12-26 2014-04-09 中国科学院信息工程研究所 Mobile Internet security service system
CN105307135A (en) * 2014-07-24 2016-02-03 芯讯通无线科技(上海)有限公司 Mobile terminal and information protection method thereof
CN104184735A (en) * 2014-08-26 2014-12-03 国家电网公司 Electric marketing mobile application safe protection system
CN106162538A (en) * 2015-03-19 2016-11-23 孙夫雄 Long distance control system and method for mobile terminal
CN105007304A (en) * 2015-06-09 2015-10-28 王一磊 SOA-based enterprise information technology system data exchange and integration system
CN106779265A (en) * 2015-11-19 2017-05-31 国网智能电网研究院 One kind is based on electric intelligent mobile terminal presence safety detecting method
CN106411939A (en) * 2016-11-21 2017-02-15 国网四川省电力公司信息通信公司 Enterprise information intranet WI-FI access security reinforcing authentication method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632807A (en) * 2018-05-03 2018-10-09 平安科技(深圳)有限公司 The method and device of mobile terminal accessing control
CN108632807B (en) * 2018-05-03 2021-08-17 平安科技(深圳)有限公司 Mobile terminal access control method and device
CN109587181A (en) * 2019-01-29 2019-04-05 公安部第研究所 A method of single-sign-on assets are realized based on two dimensional code identification authentication mode
CN109587181B (en) * 2019-01-29 2021-07-02 公安部第一研究所 Method for realizing single sign-on assets based on two-dimensional code identity authentication mode
CN112527205A (en) * 2020-12-16 2021-03-19 江苏国科微电子有限公司 Data security protection method, device, equipment and medium
CN115618435A (en) * 2022-10-28 2023-01-17 长江量子(武汉)科技有限公司 File control method applied to office equipment and office equipment
CN115618435B (en) * 2022-10-28 2023-09-15 长江量子(武汉)科技有限公司 File management and control method applied to office equipment and office equipment

Similar Documents

Publication Publication Date Title
CN109873834B (en) Enterprise-level cloud mobile application integrated platform and system based on cloud computing
CN108390851B (en) Safe remote control system and method for industrial equipment
CN106453384B (en) Secure cloud disk system and secure encryption method thereof
CN109286932A (en) Networking authentication method, apparatus and system
CN112073375A (en) Isolation device and isolation method suitable for power Internet of things client side
CN105493453B (en) It is a kind of to realize the method, apparatus and system remotely accessed
CN105162808B (en) A kind of safe login method based on national secret algorithm
CN107231378A (en) A kind of security control method based on electric power mobile office equipment, apparatus and system
CN101714918A (en) Safety system for logging in VPN and safety method for logging in VPN
CN110912929B (en) Safety control middle platform system based on regional medical treatment
CN108966216B (en) Mobile communication method and system applied to power distribution network
CN103973715B (en) Cloud computing security system and method
CN103188332B (en) A kind of remote desktop access control management method, equipment and system
CN103780609A (en) Cloud data processing method and device and cloud data security gateway
CN113596009A (en) Zero trust access method, system, zero trust security proxy, terminal and medium
CN111277607A (en) Communication tunnel module, application monitoring module and mobile terminal security access system
CN114866346B (en) Password service platform based on decentralization
CN112270020A (en) Terminal equipment safety encryption device based on safety chip
CN114268643A (en) Power distribution internet of things terminal based on active identification technology and management method
CN110445782A (en) A kind of multi-media safety broadcast control system and method
CN112437031A (en) Multi-terminal converged homeland resource mobile government system based on heterogeneous network
CN103475491B (en) A kind of remote maintenance system logged in without cryptosecurity and implementation method
CN116756776A (en) Access control method and device, desktop operating system login platform and processor
CN111245604A (en) Server data security interaction system and method
CN110278127B (en) Agent deployment method and system based on secure transmission protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171003