CN108111508A - A kind of print control instrument security protection system - Google Patents
A kind of print control instrument security protection system Download PDFInfo
- Publication number
- CN108111508A CN108111508A CN201711376711.9A CN201711376711A CN108111508A CN 108111508 A CN108111508 A CN 108111508A CN 201711376711 A CN201711376711 A CN 201711376711A CN 108111508 A CN108111508 A CN 108111508A
- Authority
- CN
- China
- Prior art keywords
- print control
- control instrument
- security protection
- transmission file
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention discloses a kind of print control instrument security protection system, wherein, print control instrument security protection system is arranged at cloud server terminal, cloud server terminal remotely connects multiple print control instrument respectively, and multiple user terminals are remotely connected, the remote transmission of file is transmitted between cloud server terminal, print control instrument and user terminal respectively;Print control instrument security protection system includes sending the sending module of transmission file, for receiving the receiving module of transmission file, and the safety protection module of linkup transmit module and receiving module, safety protection module are used to carry out security protection processing to the transmission file for being sent or being received respectively;It is specifically included in safety protection module:Security protocol unit, Data Management Unit, attack protection unit, safety check unit.Advantageous effect of the present invention is:Security protection specifically for print control instrument works, and system includes multiple-authentication work so that print control instrument not hacker attack, can comprehensively, efficiently, be safely completed with printing work.
Description
Technical field
The present invention relates to print control instrument technical field more particularly to a kind of print control instrument security protection systems.
Background technology
Print control instrument is a kind of instrument of automatic sealing, and affixing one's seal than traditional-handwork, it is scientific, normalized to have the characteristics that, realizes
People separates with print, to ensure science, security and high efficiency that seal uses.Seal is closed in print control instrument, instrument tool
Have and receive the function that instruction carries out automation print, completed with print in print control instrument.When initiating with print application, pass through scanning
Instrument is scanned upload to application with printed document, is all uploaded with every part during print with printed document by print control instrument pressure, Shen in realization system
It is please compared with printed document and with print completion part, prevents application part and the last risk hidden danger inconsistent with printed document.
In existing network security protection system, lack the system to work specifically for the security protection of print control instrument, and
Existing network safety guard technology is relatively simple, can only be from different side localised protection networks, and security protection system
Compare weak, it is easy to intercept or attack by hacker.
The content of the invention
For the above-mentioned problems in the prior art, a kind of print control instrument security protection system is now provided.
Specific technical solution is as follows:
A kind of print control instrument security protection system, wherein, the print control instrument security protection system is arranged at a cloud server terminal, institute
Cloud server terminal is stated remotely to connect multiple print control instrument respectively and remotely connect multiple user terminals, the cloud server terminal, the print
The remote transmission of file is transmitted between control instrument and the user terminal respectively;
The print control instrument security protection system includes one for sending the sending module of the transmission file, and one is used to connect
Receive the receiving module and a security protection mould for connecting the sending module and the receiving module respectively of the transmission file
Block, the safety protection module are used to carry out security protection processing to the transmission file for being sent or being received;
It is specifically included in the safety protection module:
One security protocol unit pacifies the transmission file using a digital certificate in the security protocol unit
Full verification;
Management is encrypted to the transmission file in the Data Management Unit in one Data Management Unit;
One attack protection unit, the default characteristic character included by verifying the transmission file, to the transmission file
It is filtered and verifies;
One safety check unit pre-sets verification rule in the safety check unit, and according to the school
Rule is tested to verify the transmission file.
Preferably, the safety protection module includes a permission control module, connects the receiving module, to control
To the access rights of the transmission file.
Preferably, the safety protection module includes a logging unit, and the logging unit includes:
One User operation log component records the operation behavior of all user terminals, and generates a user journal,
By checking that the user journal finds suspicious operation;
One system log recording-member records the access situation of all transmission files, in case examine in the future.
Preferably, including an account management unit, the account management unit includes:
One account management component, is managed using a password, and regularly replaces the password;
One firewall management component is transmitted the transmission file using a fixed port.
Preferably, Data Management Unit includes:
Transmission is encrypted to the transmission file in one data transfer component;
Storage is encrypted to the transmission file in one data storage part.
Preferably, safety check unit includes:
One data check component pre-sets a verification rule, according to the verification rule to the transmission file
Carry out first time verification;
One authorization check component carries out second of school according to the verification rule to the access rights of the user terminal
It tests.
Preferably, the cloud server terminal remotely connects multiple user terminals, the user terminal bag by internet
Include computer equipment or mobile terminal.
Preferably, the mobile terminal is connected to the print control instrument by Bluetooth technology.
Preferably, the cloud server terminal remotely connects multiple print control instrument by internet.
Technical scheme advantageous effect is:A kind of print control instrument security protection system is disclosed, specifically for print
Control the security protection work of instrument, system includes multiple-authentication work so that print controls instrument not hacker attack, can comprehensively,
Efficiently, it is safely completed with print work.
Description of the drawings
With reference to appended attached drawing, more fully to describe the embodiment of the present invention.However, appended attached drawing be merely to illustrate and
It illustrates, and is not meant to limit the scope of the invention.
Fig. 1 is the module map that present invention print controls instrument security protection system;
Fig. 2 is the module map on logging unit in the present invention;
Fig. 3 is the module map on account management unit in the present invention;
Fig. 4 is the module map on Data Management Unit in the present invention;
Fig. 5 is the module map on safety check unit in the present invention;
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art obtained on the premise of creative work is not made it is all its
His embodiment, belongs to the scope of protection of the invention.
It should be noted that in the case where there is no conflict, the feature in embodiment and embodiment in the present invention can phase
Mutually combination.
The invention will be further described in the following with reference to the drawings and specific embodiments, but not as limiting to the invention.
As shown in Figure 1, a kind of print control instrument security protection system, wherein, print control instrument security protection system is arranged at cloud clothes
Business end, cloud server terminal remotely connect multiple print control instrument and remotely connect multiple user terminals respectively, cloud server terminal, print control instrument
And the remote transmission of file is transmitted between user terminal respectively;
Print control instrument security protection system include one for send transmission file sending module 1, one for reception transmits
The receiving module 3 and one of file distinguishes the safety protection module 2 of linkup transmit module 1 and receiving module 3, security protection mould
Block 2 is used to carry out security protection processing to the transmission file for being sent or being received;
It is specifically included in safety protection module 2:
One security protocol unit 20 carries out safe test using a digital certificate in security protocol unit 20 to transmission file
Card;
Management is encrypted to transmission file in Data Management Unit 21 in one Data Management Unit 21;
One attack protection unit 22, the default characteristic character included by verifying transmission file, carried out transmission file
Filter and verification;
One safety check unit 23 pre-sets verification rule in safety check unit 23, and is advised according to verification
Then transmission file is verified.
By the technical solution of above-mentioned print control instrument security protection system, print control instrument security protection system is arranged at a cloud service
End, cloud server terminal remotely connect multiple print control instrument and remotely connect multiple user terminals respectively, cloud server terminal, print control instrument with
And the remote transmission of file is transmitted between user terminal respectively;Print control instrument security protection system include one for send biography
The sending module 1 of defeated file, one distinguishes linkup transmit module 1 and reception for receiving the receiving module 3 and one of transmission file
The safety protection module 2 of module 3, safety protection module 2 are used to carry out the transmission file for being sent or being received safe anti-
Shield processing;
Further, specifically included in safety protection module 2:Using a digital certificate to transmission in security protocol unit 1
File carry out safety verification, realize the access of the network transmission protocol, prevent hacker by centre intercept data it is stolen with attack
It hits, so the transmission security for ensureing transmission file is the first step as print control instrument security protection system, and in data pipe
Reason unit 21 in transmission file be encrypted transmission with storage so that even if hacker get transmission file data, also without
Method views real data;
Further, attack protection unit 3, the default characteristic character included by verifying transmission file, characteristic character bag
SQL injection characteristic character and JS injection characteristic characters are included, transmission file is filtered and verified, and then prevents hacker attack from entering
Security information is invaded or obtained, and verification rule is pre-set in safety check unit 23, and according to verification rule
Transmission file is verified, to ensure to achieve the purpose that twin check to transmission file;
Further so that print control instrument security protection system can comprehensively, efficiently, be safely completed with print work.
In a kind of preferably embodiment, including a permission control module 4, receiving module 3 is connected, to control to transmission
The access rights of file.
Specifically, the access rights of user terminal are controlled in permission control module 4, even if hacker attacks, are limited to black
Visitor accesses current operation, without injuring entire cloud server terminal, so that print control instrument security protection system can be comprehensive
Ground, efficiently, be safely completed with print work.
In a kind of preferably embodiment, safety protection module 2 includes a logging unit 24, logging unit
24 include:
One User operation log component 240 records the operation behavior of all user terminals, and generates a user journal,
By checking that user journal finds suspicious operation;
One system log recording-member 241 records the access situation of all transmission files, in case examine in the future.
Specifically, as shown in Fig. 2, logging unit 24 monitors the visit of all user terminals and all transmission files in real time
Situation, and record storage are asked, in case examine in the future.
In a kind of preferably embodiment, including an account management unit 25, account management unit 25 includes:
One account management component 250, is managed using a password, and regularly replaces password;
One firewall management component 251 is transmitted transmission file using a fixed port.
Specifically, as shown in figure 3, using a password in account management unit 25, upper and lower case letter, number are included in password
And complex symbol, and regularly replace increase and crack difficulty, furthermore, transmission file is transmitted using a fixed port, is avoided
Unnecessary port exposure.
In a kind of preferably embodiment, Data Management Unit 21 includes:
Transmission is encrypted to transmission file in one data transfer component 210;
Storage is encrypted to transmission file in one data storage part 211.
Specifically, as shown in figure 4, for significant datas such as user name, password, finger print datas, transmission is encrypted, and
Encryption storage even if hacker attacks gets these transmission files, can not also check real transmission file.
In a kind of preferably embodiment, safety check unit 23 includes:
One data check component 230 pre-sets verification rule, and transmission file is carried out for the first time according to verification rule
Verification;
One authorization check component 231 carries out second to the access rights of user terminal according to verification rule and verifies.
Specifically, as shown in figure 5, in safety check unit 23, make free burial ground for the destitute by oneself in advance and set a verification rule, according to
Verification rule carries out transmission file first time verification, and carries out second to the access rights of user terminal and verify, to protect
Card transmission file achievees the purpose that twin check.
In a kind of preferably embodiment, cloud server terminal connects multiple user terminals by internet, and user terminal includes
Computer equipment or mobile terminal.
In a kind of preferably embodiment, mobile terminal is connected to print control instrument by Bluetooth technology.
In a kind of preferably embodiment, cloud server terminal remotely connects multiple print control instrument by internet.
In a kind of preferably embodiment, print control instrument security protection system include one for send transmit the transmission of file
Module 1, one distinguishes linkup transmit module 1 and the safety of receiving module 3 for receiving the receiving module 3 and one of transmission file
Protection module 2, safety protection module 2 are used to carry out security protection processing to the transmission file for being sent or being received;
Further, safety verification is carried out to transmission file, realizes the network transmission protocol using a digital certificate first
It accesses, and management is encrypted to transmission file, the default characteristic character included by verifying transmission file, to transmission text
Part is filtered and verifies;
Further, make one verification rule of free burial ground for the destitute setting by oneself in advance, transmission file is carried out for the first time according to verification rule
Verification, and second is carried out to the access rights of user terminal according to verification rule and is verified, to ensure to reach twin check
Purpose finally controls the access rights of user terminal, even if hacker attacks, will not view real transmission text
Part, and entire cloud server terminal will not be injured, so that security protection system can comprehensively, efficiently, safely
It completes with print work.
The foregoing is merely preferred embodiments of the present invention, not thereby limit embodiments of the present invention and protection model
It encloses, to those skilled in the art, should can appreciate that all with made by description of the invention and diagramatic content
Equivalent substitution and obviously change obtained scheme, should all include within the scope of the present invention.
Claims (9)
1. a kind of print control instrument security protection system, which is characterized in that the print control instrument security protection system is arranged at a cloud service
End, the cloud server terminal remotely connect multiple print control instrument and remotely connect multiple user terminals respectively, the cloud server terminal,
The remote transmission of file is transmitted between the print control instrument and the user terminal respectively;
The print control instrument security protection system includes one for sending the sending module of the transmission file, and one is used to receive institute
The receiving module and a safety protection module for connecting the sending module and the receiving module respectively of transmission file are stated,
The safety protection module is used to carry out security protection processing to the transmission file for being sent or being received;
It is specifically included in the safety protection module:
One security protocol unit carries out safe test using a digital certificate in the security protocol unit to the transmission file
Card;
Management is encrypted to the transmission file in the Data Management Unit in one Data Management Unit;
One attack protection unit, the default characteristic character included by verifying the transmission file, carries out the transmission file
Filtering and verification;
One safety check unit pre-sets verification rule in the safety check unit, and is advised according to the verification
Then the transmission file is verified.
2. print control instrument security protection system according to claim 1, which is characterized in that including a permission control module, connect
The receiving module is connect, to control the access rights to the transmission file.
3. print control instrument security protection system according to claim 1, which is characterized in that the safety protection module includes
One logging unit, the logging unit include:
One User operation log component records the operation behavior of all user terminals, and generates a user journal, passes through
Check that the user journal finds suspicious operation;
One system log recording-member records the access situation of all transmission files, in case examine in the future.
4. print control instrument security protection system according to claim 1, which is characterized in that the safety protection module includes
One account management unit, the account management unit include:
One account management component, is managed using a password, and regularly replaces the password;
One firewall management component is transmitted the transmission file using a fixed port.
5. print control instrument security protection system according to claim 1, which is characterized in that Data Management Unit includes:
Transmission is encrypted to the transmission file in one data transfer component;
Storage is encrypted to the transmission file in one data storage part.
6. print control instrument security protection system according to claim 1, which is characterized in that safety check unit includes:
One data check component pre-sets a verification rule, and the transmission file is carried out according to the verification rule
It verifies for the first time;
One authorization check component carries out second to the access rights of the user terminal according to the verification rule and verifies.
7. print control instrument security protection system according to claim 1, which is characterized in that the cloud server terminal passes through internet
Multiple user terminals are remotely connected, the user terminal includes computer equipment or mobile terminal.
8. print control instrument security protection system according to claim 7, which is characterized in that the mobile terminal passes through bluetooth skill
Art is connected to the print control instrument.
9. print control instrument security protection system according to claim 1, which is characterized in that the cloud server terminal passes through internet
Remotely connect multiple print control instrument.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711376711.9A CN108111508A (en) | 2017-12-19 | 2017-12-19 | A kind of print control instrument security protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711376711.9A CN108111508A (en) | 2017-12-19 | 2017-12-19 | A kind of print control instrument security protection system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108111508A true CN108111508A (en) | 2018-06-01 |
Family
ID=62210147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711376711.9A Pending CN108111508A (en) | 2017-12-19 | 2017-12-19 | A kind of print control instrument security protection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108111508A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113135045A (en) * | 2021-05-12 | 2021-07-20 | 武汉先同科技有限公司 | Electronic laser stamping equipment and method |
CN118094637A (en) * | 2024-04-23 | 2024-05-28 | 北京惠朗时代科技有限公司 | Information storage safety protection system of printing control instrument |
CN118094637B (en) * | 2024-04-23 | 2024-07-09 | 北京惠朗时代科技有限公司 | Information storage safety protection system of printing control instrument |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729550A (en) * | 2009-11-09 | 2010-06-09 | 西北大学 | Digital content safeguard system based on transparent encryption and decryption method thereof |
CN102332980A (en) * | 2011-09-14 | 2012-01-25 | 福建伊时代信息科技股份有限公司 | Method and system for managing electronic file |
CN102467546A (en) * | 2010-11-16 | 2012-05-23 | 鸿富锦精密工业(深圳)有限公司 | Method for generating media file list |
CN103268443A (en) * | 2012-12-27 | 2013-08-28 | 武汉安天信息技术有限责任公司 | Symbol-based Android malicious code detection method and system |
CN103310164A (en) * | 2013-06-18 | 2013-09-18 | 齐宇庆 | Verification method of electronic seal pattern and verification method of file containing electronic seal |
CN103632107A (en) * | 2012-08-23 | 2014-03-12 | 苏州慧盾信息安全科技有限公司 | Mobile terminal information safety protection system and method |
CN103927679A (en) * | 2014-03-31 | 2014-07-16 | 浪潮软件集团有限公司 | Electronic invoice signature and verification method |
CN104036191A (en) * | 2014-06-11 | 2014-09-10 | 上海睿海信息技术有限公司 | Control method based on file filter driver and characteristic code of file format |
CN104156809A (en) * | 2014-07-31 | 2014-11-19 | 王东 | Intelligent stamp protection control device and stamp management system |
CN106346966A (en) * | 2015-07-20 | 2017-01-25 | 周相山 | Sealing management system based on cloud platform |
CN107395362A (en) * | 2017-07-27 | 2017-11-24 | 童迎伟 | Third-party authentication system and checking management-control method based on cloud intelligence seal |
CN107451793A (en) * | 2017-07-27 | 2017-12-08 | 童迎伟 | Intelligent seal cloud management system and with chapter content anomalous identification management-control method |
-
2017
- 2017-12-19 CN CN201711376711.9A patent/CN108111508A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729550A (en) * | 2009-11-09 | 2010-06-09 | 西北大学 | Digital content safeguard system based on transparent encryption and decryption method thereof |
CN102467546A (en) * | 2010-11-16 | 2012-05-23 | 鸿富锦精密工业(深圳)有限公司 | Method for generating media file list |
CN102332980A (en) * | 2011-09-14 | 2012-01-25 | 福建伊时代信息科技股份有限公司 | Method and system for managing electronic file |
CN103632107A (en) * | 2012-08-23 | 2014-03-12 | 苏州慧盾信息安全科技有限公司 | Mobile terminal information safety protection system and method |
CN103268443A (en) * | 2012-12-27 | 2013-08-28 | 武汉安天信息技术有限责任公司 | Symbol-based Android malicious code detection method and system |
CN103310164A (en) * | 2013-06-18 | 2013-09-18 | 齐宇庆 | Verification method of electronic seal pattern and verification method of file containing electronic seal |
CN103927679A (en) * | 2014-03-31 | 2014-07-16 | 浪潮软件集团有限公司 | Electronic invoice signature and verification method |
CN104036191A (en) * | 2014-06-11 | 2014-09-10 | 上海睿海信息技术有限公司 | Control method based on file filter driver and characteristic code of file format |
CN104156809A (en) * | 2014-07-31 | 2014-11-19 | 王东 | Intelligent stamp protection control device and stamp management system |
CN106346966A (en) * | 2015-07-20 | 2017-01-25 | 周相山 | Sealing management system based on cloud platform |
CN107395362A (en) * | 2017-07-27 | 2017-11-24 | 童迎伟 | Third-party authentication system and checking management-control method based on cloud intelligence seal |
CN107451793A (en) * | 2017-07-27 | 2017-12-08 | 童迎伟 | Intelligent seal cloud management system and with chapter content anomalous identification management-control method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113135045A (en) * | 2021-05-12 | 2021-07-20 | 武汉先同科技有限公司 | Electronic laser stamping equipment and method |
CN118094637A (en) * | 2024-04-23 | 2024-05-28 | 北京惠朗时代科技有限公司 | Information storage safety protection system of printing control instrument |
CN118094637B (en) * | 2024-04-23 | 2024-07-09 | 北京惠朗时代科技有限公司 | Information storage safety protection system of printing control instrument |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10754826B2 (en) | Techniques for securely sharing files from a cloud storage | |
CN105591744B (en) | A kind of genuine cyber identification authentication method and system | |
CN101778099B (en) | Architecture accessing trusted network for tolerating untrusted components and access method thereof | |
CN105262748B (en) | Identity authentication method and system are carried out to user terminal in wide area network | |
CN109787988A (en) | A kind of identity reinforces certification and method for authenticating and device | |
CN104202338B (en) | A kind of safety access method being applicable to enterprise-level Mobile solution | |
CN104811455A (en) | Cloud computing identity authentication method | |
CN104394531A (en) | Wireless network connecting method of a terminal device | |
CN101588360A (en) | Associated equipment and method for internal network security management | |
CN106488452A (en) | A kind of mobile terminal safety access authentication method of combination fingerprint | |
CN101083659A (en) | Security policy and environment for portable equipment | |
CN107135233A (en) | Safe transmission method and device, the server and storage medium of information | |
CN109347875A (en) | Internet of things equipment, platform of internet of things and the method and system for accessing platform of internet of things | |
CN109302397B (en) | Network security management method, platform and computer readable storage medium | |
CN104318146A (en) | Fingerprint-identification-based cloud storage method | |
CN103188254A (en) | Network security protection method capable of giving consideration to both smoothness and safety of internal and external network information | |
CN115150208A (en) | Zero-trust-based Internet of things terminal secure access method and system | |
CN101369995A (en) | Dial-up gateway based on security credible connection technology | |
CN109257338A (en) | A kind of System and method for of server log re-authentication | |
CN107835162A (en) | The method that software digital permit server signs and issues software digital permissions | |
CN104243488B (en) | A kind of login authentication method of inter-network site server | |
CN105681350A (en) | Zero interaction double-factor authentication system and method | |
CN108111508A (en) | A kind of print control instrument security protection system | |
CN109495500A (en) | A kind of double factor authentication method based on smart phone | |
CN105187417A (en) | Authority obtaining method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180601 |
|
RJ01 | Rejection of invention patent application after publication |