CN107231378A - A kind of security control method based on electric power mobile office equipment, apparatus and system - Google Patents
A kind of security control method based on electric power mobile office equipment, apparatus and system Download PDFInfo
- Publication number
- CN107231378A CN107231378A CN201710600683.8A CN201710600683A CN107231378A CN 107231378 A CN107231378 A CN 107231378A CN 201710600683 A CN201710600683 A CN 201710600683A CN 107231378 A CN107231378 A CN 107231378A
- Authority
- CN
- China
- Prior art keywords
- instruction
- mobile
- mobile terminal
- management
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application discloses a kind of security control method based on electric power mobile office equipment, device its system.Wherein, methods described includes:Management instruction is sent into mobile terminal, wherein, the management instruction includes monitoring of tools instruction and device security policy execute instruction;If the management instruction is monitoring of tools instruction, SDK interfaces are called to carry out security monitoring;Receive monitoring information of the mobile terminal according to the monitoring instruction feedback;If the management instruction is device security policy execute instruction, the mobile terminal is controlled to perform the device security policy execute instruction.The application effectively solves the safety of electric power mobile office equipment, and the electric power mobile office equipment of management and control in real time.
Description
Technical field
The application is related to power domain, more particularly to a kind of security control method based on electric power mobile office equipment, dress
Put and system.
Background technology
Electrical power services play key player, electric power enterprise in daily life as an infrastructure service of the relation people's livelihood
Also a straight grip power information is used as the most important thing in work to industry.Informatization is also from fixed desktop end to movement
The development of hand-held extreme direction, through construction in a few years, the application of the mobile terminals of various functional areas has begun to take shape, and mobile office is also
As the indispensable part of routine office work, but the application installed with mobile terminal is more and more.
Uneven and different between the single equipment hardware environment of independent utility development quality also gives mobile office band
The challenge in terms of security is carried out, although access at present is electric power enterprise Intranet, the data and business accessed are not belonging to
Enterprise key, therefore by slave unit end, to the bursting tube of the complete sets such as network transmission, remote control and backstage security monitoring
Control system, while mobile office brings convenient, also solves significant portion of safety issue, is that grid company enterprise moves
The development of dynamic application provides security guarantee.
The content of the invention
This application provides a kind of security control method based on electric power mobile office equipment, apparatus and system, to solve
The safety issue of electric power mobile office.
In a first aspect, this application provides a kind of security control method based on electric power mobile office equipment, methods described
Apply on main control computer, methods described includes:
Management instruction is sent into mobile terminal, wherein, the management instruction includes monitoring of tools instruction and equipment safety
Strategy execution is instructed;
If the management instruction is monitoring of tools instruction, SDK interfaces are called to carry out security monitoring;
Receive monitoring information of the mobile terminal according to the monitoring instruction feedback;
If the management instruction is device security policy execute instruction, the mobile terminal is controlled to perform the equipment
Security strategy execute instruction.
Second aspect, present invention also provides a kind of security management and control device based on electric power mobile office equipment, its feature
It is, including management instruction sending module and information receiving module, wherein:
The management instruction sending module, for sending management instruction into mobile terminal, wherein, the management instruction bag
Include monitoring of tools instruction and device security policy execute instruction;
Security monitoring module, if being monitoring of tools instruction for the management instruction, calls SDK interfaces to carry out safety
Monitoring;
Receiving module, the monitoring information sent for mobile terminal described in real-time reception;
Control module, if being device security policy execute instruction for the instruction, controls the mobile terminal to hold
The row device security policy execute instruction.
The third aspect, present invention also provides a kind of security management and control system based on electric power mobile office equipment, its feature
It is, including:Main control computer, mobile management platform, Mobile solution shop and mobile terminal, wherein:
The main control computer is connected by 4A platforms with the mobile management Platform communication;
The mobile management platform is connected by intranet and extranet switching plane with the Mobile solution shop;
The main control computer is connected by VPN and mobile management platform with the communication of mobile terminal.
Security control method disclosed in the present application based on electric power mobile office equipment, in apparatus and system, bonding apparatus
Safely, these technical advantages are monitored using safety, data safety, operation, the protrusion occurred in being handled official business for current electric power mobile
Problem is optimized and improved:To greatest extent ensure the business of grid power mobile office My Perspective On The Co-building and mobile office and
Strong technological means is provided in terms of Information Security.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme of the application, letter will be made to the required accompanying drawing used in embodiment below
Singly introduce, it should be apparent that, for those of ordinary skills, without having to pay creative labor,
Other accompanying drawings can also be obtained according to these accompanying drawings.
A kind of flow for security control method based on electric power mobile office equipment that Fig. 1 provides for the embodiment of the present application is shown
It is intended to;
The flow for another security control method based on electric power mobile office equipment that Fig. 2 provides for the embodiment of the present application
Figure;
A kind of security management and control apparatus structure signal based on electric power mobile office equipment that Fig. 3 provides for the embodiment of the present application
Figure;
Fig. 4 shows for another security management and control apparatus structure based on electric power mobile office equipment that the embodiment of the present application is provided
It is intended to.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
This method is absorbed in using mobile device safety management (MDM), mobile application security management (MAM), mobile data
A variety of security protections and the safety management means such as safety management (MCM), mobile subscriber's safety management and Mobile solution operation monitoring,
Mobile security control platform is built in terms of terminal, network, three, platform, safe and reliable, economic and practical mobile security is realized
Management and control function.
Referring to Fig. 1, a kind of security control method based on electric power mobile office equipment provided for the embodiment of the present application
Schematic flow sheet.
In step S101, management instruction is sent into mobile terminal, wherein, the management instruction includes monitoring of tools and referred to
Order and device security policy execute instruction;
The method that the embodiment of the present application is provided applies the master control in the security management and control system based on electric power mobile office equipment
In machine, when mobile terminal application enters Intranet, user accesses 4A (Authentication using PC computers insertion Ukey
Account Authorization Audit, unified security management platform solution) door, pass through single-point in 4A doors
The self-service certificate request interface for opening mobile access-in management platform is logged in, VPN (Virtual Private are called first
Network, VPN) interface checking VPN it is whether open-minded, afterwards by interface apply certificate granting code when call PKI/
CA mobile certificate application interface.
When mobile terminal has certificate, VPN is logged in by mobile certificate, and call PKI/CA (Public Key
Infrastructure, PKIX;Certificate Authority, authentication center) certification authentication interface checking
Certificate validity.After User logs in success, by VPN passage portal entry APP homepages, and Mobile solution management interface is called to obtain
Take the authority using store information and active user.User's promoter application from door APP, sub- application passes through Mobile solution pipe
Reason obtains subscriber identity information and authority, reconnects container cloud and obtains corresponding service, such as service content is needed from operation system
Middle acquisition then needs to connect operation system by container cloud.4A data are mobile by interface synchronization to mobile terminal access-in management
Terminal access resynchronisation data are managed to Mobile solution.
Mobile access-in management platform issues administration order, and order carries out data ferry-boat, ferry-boat by intranet and extranet switching plane
To DMZ areas Mobile solution shop, Mobile solution shop pushes that command mode is different for different clients, and IOS clients are led to
The APNS server push for crossing apple is sent to each client, and android clients then push order to each by the individual platform that is bulldozed
Client.
In step s 102, if management instruction is monitoring of tools instruction, SDK interfaces are called to carry out security monitoring.
SDK (Software Development Kit, SDK) interface is provided in system for being set
Standby monitoring.User each can be connected to the mobile terminal of Intranet by master control machine monitoring, when needing to monitor or check some
During mobile terminal, just it can be monitored by main control computer.
Monitoring of tools instruction is an instruction monitored in real time, can monitor in real time mobile terminal flow, using, equipment,
User and abnormality alarming.Mobile terminal feeds back above-mentioned monitoring information to main control computer in real time.
In step s 103, monitoring information of the mobile terminal according to monitoring instruction feedback is received.
Real-time or periodic receipt mobile terminal can include movement according to the monitoring information for monitoring instruction feedback, monitoring information
The use flow of terminal, using information such as running situation, the running situation of equipment, User logs in and abnormality alarmings.According to movement
The monitoring information of terminal feedback determines the service condition of mobile terminal, so as to play purpose and the effect of monitoring.
When sending monitoring instruction, instruction is encrypted, and prevents instruction to be tampered in transmitting procedure.
In step S104, if the management instruction is device security policy execute instruction, control described mobile whole
End performs the device security policy execute instruction.
If it is device security policy execute instruction to manage instruction, obtains and send security strategy execute instruction to mobile whole
End, control mobile terminal performs device security policy instruction instruction.Device security policy execute instruction is used to control mobile terminal
No photographing, forbid screenshotss and issue the mark and password of Intranet, mobile terminal is according to the mark and password of the Intranet issued
It is connected to Intranet.Main control computer sets the screen-lock password of mobile terminal, and predeterminable screen-lock password is device identification, prevents the third party from making
With.
When transmitting data, main control computer is retransmited to mobile terminal after internal data is compressed and encrypted, and prevents number
According to being tampered or intercept in transmitting procedure.In addition, internal data is by sandbox isolation technology, by internal data store in safety
In sandbox, it is impossible to had access to by the Mobile solution of non-in-house network, and data carry out encryption storage, even if mobile terminal is cracked
Or escape from prison, the data file of copy can not also be checked.
The main data to enterprise mobile application are encrypted and isolation processing in the embodiment of the present application, the file of data storage
Exclusive by electric power mobile application, enterprise's application can not be accessed, meanwhile, using the file after RSA+AES double-encryptions, only make
Data content therein can be just read with specific manner of decryption, Information Security is fully ensured.
Referring to Fig. 2, another security control method based on electric power mobile office equipment provided for the embodiment of the present application
Schematic flow sheet.
In step S105, mobile management platform is accessed, and call VPN interfaces.
In step s 106, if VPN interfaces are open-minded, PKI/CA mobile certificate application interface is called.
In step s 107, application certificate granting code is obtained, and the moving tube is logged according to application certificate granting code
Platform.
The method that the embodiment of the present application is provided is applied to main control computer and sets up the process being connected with mobile terminal, and main control computer is
, it is necessary to access mobile management platform first when mobile terminal sets up connection, and call VPN interfaces.If VPN interfaces are open-minded,
PKI/CA mobile certificate application interface is then called, application certificate granting code is obtained, is logged in and moved according to application certificate granting code
Management platform.
The embodiment of the present application is directed to the problem of Intranet application and Information Security are lacked in current electric power mobile office process,
Supplement optimization and improvement are carried out, slave unit security, application security, Information Security and several broad aspects of monitoring are started with, to move
While dynamic office brings convenient, significant portion of safety issue is also solved, is the hair of grid company enterprise mobile application
Exhibition provides security guarantee.
Referring to Fig. 3, a kind of security management and control device knot based on electric power mobile office equipment provided for the embodiment of the present application
Structure schematic diagram.
As shown in figure 3, the security management and control device based on electric power mobile office equipment includes management instruction sending module and letter
Receiving module is ceased, wherein:Instruction sending module is managed, management instruction is sent into mobile terminal, wherein, management instruction includes setting
Standby monitoring instruction and device security policy execute instruction.Security monitoring module, if being monitoring of tools instruction for managing instruction,
SDK interfaces are then called to carry out security monitoring;Receiving module is used for the monitoring information that mobile terminal described in real-time reception is sent.Control
If it is device security policy execute instruction that module, which is used to instruct, the mobile terminal is controlled to perform the device security policy
Execute instruction.
Control module include disabled module, disabled module be used for control the mobile terminal no photographing, forbid screenshotss with
And the mark and password of Intranet are issued, control the mobile terminal to connect Intranet automatically.
Control module also includes encrypting module and isolation module;When encrypting module is used to transmit data, internal data is compressed
And sent after encrypting to the mobile terminal;Isolation module is used to isolate internal data and encrypt storage.
Referring to Fig. 4, another security management and control device based on electric power mobile office equipment provided for the embodiment of the present application
Structural representation.
As shown in figure 4, the security management and control device of electric power mobile office equipment also includes AM access module, calling module and login
Module;AM access module is used to access mobile management platform, and calls VPN interfaces;If calling module is used for the VPN interfaces
It is open-minded, then call PKI/CA mobile certificate application interface;Login module applies for certificate granting code for obtaining, and according to
The application certificate granting code logs in the mobile management platform.
Seen from the above description, the device that the embodiment of the present application is provided mainly is encrypted and isolated to inside data of enterprise
Processing, slave unit is safe, start with using safety, data safety and monitoring, while being that mobile office brings convenient, it is ensured that it is pacified
Quan Xing.
The embodiment of the present application additionally provides a kind of security management and control system based on electric power mobile office equipment, including:Master control
Machine, mobile management platform, Mobile solution shop and mobile terminal, wherein:Main control computer is patted by 4A platforms with the moving tube
Platform is communicated to connect;Mobile management platform is connected by intranet and extranet switching plane with the Mobile solution shop;Main control computer passes through VPN
And mobile management platform is connected with the communication of mobile terminal.
Those skilled in the art will readily occur to its of the present invention after the disclosure that specification and practice are invented here is considered
Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or
Person's adaptations follow the general principle of the present invention and including undocumented common knowledge in the art of the invention
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.
Claims (10)
1. a kind of security control method based on electric power mobile office equipment, methods described is applied on main control computer, its feature exists
In methods described includes:
Management instruction is sent into mobile terminal, wherein, the management instruction includes monitoring of tools instruction and device security policy
Execute instruction;
If the management instruction is monitoring of tools instruction, SDK SDK interfaces are called to carry out security monitoring;
Receive monitoring information of the mobile terminal according to the monitoring instruction feedback;
If the management instruction is device security policy execute instruction, the mobile terminal is controlled to perform the equipment safety
Strategy execution is instructed.
2. according to the method described in claim 1, it is characterised in that if the management instruction is that device security policy is held
Row instruction, then control the mobile terminal to perform the device security policy execute instruction, including:
The mobile terminal no photographing is controlled, forbid screenshotss and issues the mark and password of Intranet, is controlled described mobile whole
The automatic connection Intranet in end.
3. according to the method described in claim 1, it is characterised in that if the management instruction is that device security policy is held
Row instruction, then control the mobile terminal to perform the device security policy execute instruction, including:
When transmitting data, compress internal data and sent after encrypting to the mobile terminal;
Internal data is isolated and storage is encrypted.
4. according to the method described in claim 1, it is characterised in that the monitoring information includes:Facility information, equipment safety letter
Breath and operation information.
5. according to the method described in claim 1, it is characterised in that methods described also includes:
Mobile management platform is accessed, and calls VPN VPN interfaces;
If the VPN interfaces are open-minded, PKIX PKI/CA mobile certificate application interface is called;
Application certificate granting code is obtained, and the mobile management platform is logged according to the application certificate granting code.
6. a kind of security management and control device based on electric power mobile office equipment, it is characterised in that including management instruction sending module
And information receiving module, wherein:
The management instruction sending module, for sending management instruction into mobile terminal, wherein, the management instruction includes setting
Standby monitoring instruction and device security policy execute instruction;
Security monitoring module, if being monitoring of tools instruction for the management instruction, calls SDK interfaces to carry out safe prison
Control;
Receiving module, the monitoring information sent for mobile terminal described in real-time reception;
Control module, if being device security policy execute instruction for the instruction, controls the mobile terminal to perform institute
State device security policy execute instruction.
7. device according to claim 6, it is characterised in that the control module includes:Disabled module;
The disabled module, for controlling the mobile terminal no photographing, forbids screenshotss and issues the mark of Intranet and close
Code, controls the mobile terminal to connect Intranet automatically.
8. device according to claim 6, it is characterised in that the control module includes:Encrypting module and isolation module;
The encrypting module, for transmitting during data, compresses internal data and is sent after encrypting to the mobile terminal;
The isolation module, for being isolated internal data and encrypting storage.
9. device according to claim 6, it is characterised in that described device also includes AM access module, calling module and stepped on
Record module;
The AM access module, for accessing mobile management platform, and calls VPN interfaces;
The calling module, if open-minded for the VPN interfaces, calls PKI/CA mobile certificate application interface;
The login module, described move is logged in for obtaining application certificate granting code, and according to the application certificate granting code
Dynamic management platform.
10. a kind of security management and control system based on electric power mobile office equipment, it is characterised in that including:Main control computer, mobile management
Platform, Mobile solution shop and mobile terminal, wherein:
The main control computer is connected by 4A platforms with the mobile management Platform communication;
The mobile management platform is connected by intranet and extranet switching plane with the Mobile solution shop;
The main control computer is connected by VPN and mobile management platform with the communication of mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710600683.8A CN107231378A (en) | 2017-07-21 | 2017-07-21 | A kind of security control method based on electric power mobile office equipment, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710600683.8A CN107231378A (en) | 2017-07-21 | 2017-07-21 | A kind of security control method based on electric power mobile office equipment, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107231378A true CN107231378A (en) | 2017-10-03 |
Family
ID=59956127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710600683.8A Pending CN107231378A (en) | 2017-07-21 | 2017-07-21 | A kind of security control method based on electric power mobile office equipment, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107231378A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108632807A (en) * | 2018-05-03 | 2018-10-09 | 平安科技(深圳)有限公司 | The method and device of mobile terminal accessing control |
CN109587181A (en) * | 2019-01-29 | 2019-04-05 | 公安部第研究所 | A method of single-sign-on assets are realized based on two dimensional code identification authentication mode |
CN112527205A (en) * | 2020-12-16 | 2021-03-19 | 江苏国科微电子有限公司 | Data security protection method, device, equipment and medium |
CN115618435A (en) * | 2022-10-28 | 2023-01-17 | 长江量子(武汉)科技有限公司 | File control method applied to office equipment and office equipment |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101605066A (en) * | 2009-04-22 | 2009-12-16 | 网经科技(苏州)有限公司 | Telecommunication network behavior method for real-time monitoring based on multilayer data interception |
CN102271157A (en) * | 2011-07-21 | 2011-12-07 | 深圳市中兴新通讯设备有限公司 | Power monitoring system, method, wireless fidelity (WIFI) transceiver and intelligent power equipment |
CN102868750A (en) * | 2012-09-20 | 2013-01-09 | 无锡华御信息技术有限公司 | Monitoring and management system of information processing equipment |
US20140006347A1 (en) * | 2011-10-11 | 2014-01-02 | Zenprise, Inc. | Secure container for protecting enterprise data on a mobile device |
CN103716785A (en) * | 2013-12-26 | 2014-04-09 | 中国科学院信息工程研究所 | Mobile Internet security service system |
CN104184735A (en) * | 2014-08-26 | 2014-12-03 | 国家电网公司 | Electric marketing mobile application safe protection system |
CN104424317A (en) * | 2013-09-06 | 2015-03-18 | 中国移动通信集团四川有限公司 | Method and system for providing application for user terminal |
CN105007304A (en) * | 2015-06-09 | 2015-10-28 | 王一磊 | SOA-based enterprise information technology system data exchange and integration system |
CN105307135A (en) * | 2014-07-24 | 2016-02-03 | 芯讯通无线科技(上海)有限公司 | Mobile terminal and information protection method thereof |
CN106162538A (en) * | 2015-03-19 | 2016-11-23 | 孙夫雄 | Long distance control system and method for mobile terminal |
CN106411939A (en) * | 2016-11-21 | 2017-02-15 | 国网四川省电力公司信息通信公司 | Enterprise information intranet WI-FI access security reinforcing authentication method |
CN106779265A (en) * | 2015-11-19 | 2017-05-31 | 国网智能电网研究院 | One kind is based on electric intelligent mobile terminal presence safety detecting method |
-
2017
- 2017-07-21 CN CN201710600683.8A patent/CN107231378A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101605066A (en) * | 2009-04-22 | 2009-12-16 | 网经科技(苏州)有限公司 | Telecommunication network behavior method for real-time monitoring based on multilayer data interception |
CN102271157A (en) * | 2011-07-21 | 2011-12-07 | 深圳市中兴新通讯设备有限公司 | Power monitoring system, method, wireless fidelity (WIFI) transceiver and intelligent power equipment |
US20140006347A1 (en) * | 2011-10-11 | 2014-01-02 | Zenprise, Inc. | Secure container for protecting enterprise data on a mobile device |
CN102868750A (en) * | 2012-09-20 | 2013-01-09 | 无锡华御信息技术有限公司 | Monitoring and management system of information processing equipment |
CN104424317A (en) * | 2013-09-06 | 2015-03-18 | 中国移动通信集团四川有限公司 | Method and system for providing application for user terminal |
CN103716785A (en) * | 2013-12-26 | 2014-04-09 | 中国科学院信息工程研究所 | Mobile Internet security service system |
CN105307135A (en) * | 2014-07-24 | 2016-02-03 | 芯讯通无线科技(上海)有限公司 | Mobile terminal and information protection method thereof |
CN104184735A (en) * | 2014-08-26 | 2014-12-03 | 国家电网公司 | Electric marketing mobile application safe protection system |
CN106162538A (en) * | 2015-03-19 | 2016-11-23 | 孙夫雄 | Long distance control system and method for mobile terminal |
CN105007304A (en) * | 2015-06-09 | 2015-10-28 | 王一磊 | SOA-based enterprise information technology system data exchange and integration system |
CN106779265A (en) * | 2015-11-19 | 2017-05-31 | 国网智能电网研究院 | One kind is based on electric intelligent mobile terminal presence safety detecting method |
CN106411939A (en) * | 2016-11-21 | 2017-02-15 | 国网四川省电力公司信息通信公司 | Enterprise information intranet WI-FI access security reinforcing authentication method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108632807A (en) * | 2018-05-03 | 2018-10-09 | 平安科技(深圳)有限公司 | The method and device of mobile terminal accessing control |
CN108632807B (en) * | 2018-05-03 | 2021-08-17 | 平安科技(深圳)有限公司 | Mobile terminal access control method and device |
CN109587181A (en) * | 2019-01-29 | 2019-04-05 | 公安部第研究所 | A method of single-sign-on assets are realized based on two dimensional code identification authentication mode |
CN109587181B (en) * | 2019-01-29 | 2021-07-02 | 公安部第一研究所 | Method for realizing single sign-on assets based on two-dimensional code identity authentication mode |
CN112527205A (en) * | 2020-12-16 | 2021-03-19 | 江苏国科微电子有限公司 | Data security protection method, device, equipment and medium |
CN115618435A (en) * | 2022-10-28 | 2023-01-17 | 长江量子(武汉)科技有限公司 | File control method applied to office equipment and office equipment |
CN115618435B (en) * | 2022-10-28 | 2023-09-15 | 长江量子(武汉)科技有限公司 | File management and control method applied to office equipment and office equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109873834B (en) | Enterprise-level cloud mobile application integrated platform and system based on cloud computing | |
CN108390851B (en) | Safe remote control system and method for industrial equipment | |
CN106453384B (en) | Secure cloud disk system and secure encryption method thereof | |
CN109286932A (en) | Networking authentication method, apparatus and system | |
CN112073375A (en) | Isolation device and isolation method suitable for power Internet of things client side | |
CN105493453B (en) | It is a kind of to realize the method, apparatus and system remotely accessed | |
CN105162808B (en) | A kind of safe login method based on national secret algorithm | |
CN107231378A (en) | A kind of security control method based on electric power mobile office equipment, apparatus and system | |
CN101714918A (en) | Safety system for logging in VPN and safety method for logging in VPN | |
CN110912929B (en) | Safety control middle platform system based on regional medical treatment | |
CN108966216B (en) | Mobile communication method and system applied to power distribution network | |
CN103973715B (en) | Cloud computing security system and method | |
CN103188332B (en) | A kind of remote desktop access control management method, equipment and system | |
CN103780609A (en) | Cloud data processing method and device and cloud data security gateway | |
CN113596009A (en) | Zero trust access method, system, zero trust security proxy, terminal and medium | |
CN111277607A (en) | Communication tunnel module, application monitoring module and mobile terminal security access system | |
CN114866346B (en) | Password service platform based on decentralization | |
CN112270020A (en) | Terminal equipment safety encryption device based on safety chip | |
CN114268643A (en) | Power distribution internet of things terminal based on active identification technology and management method | |
CN110445782A (en) | A kind of multi-media safety broadcast control system and method | |
CN112437031A (en) | Multi-terminal converged homeland resource mobile government system based on heterogeneous network | |
CN103475491B (en) | A kind of remote maintenance system logged in without cryptosecurity and implementation method | |
CN116756776A (en) | Access control method and device, desktop operating system login platform and processor | |
CN111245604A (en) | Server data security interaction system and method | |
CN110278127B (en) | Agent deployment method and system based on secure transmission protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171003 |