CN108154026A - Safety communicating method and system of the Root without intrusion are exempted from based on android system - Google Patents

Safety communicating method and system of the Root without intrusion are exempted from based on android system Download PDF

Info

Publication number
CN108154026A
CN108154026A CN201711464695.9A CN201711464695A CN108154026A CN 108154026 A CN108154026 A CN 108154026A CN 201711464695 A CN201711464695 A CN 201711464695A CN 108154026 A CN108154026 A CN 108154026A
Authority
CN
China
Prior art keywords
module
application program
security
server
packet capturing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711464695.9A
Other languages
Chinese (zh)
Other versions
CN108154026B (en
Inventor
汪仕兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Network Security Technology Co ltd
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201711464695.9A priority Critical patent/CN108154026B/en
Publication of CN108154026A publication Critical patent/CN108154026A/en
Application granted granted Critical
Publication of CN108154026B publication Critical patent/CN108154026B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Human Computer Interaction (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention disclose it is a kind of safety communicating methods of the Root without intrusion is exempted from based on android system, the data safety that this method is used to implement between Android smart machines and server interacts, including:Dynamic packet capturing module and security client end module are implanted into Android smart machines;Start the application program of Android smart machines;Application program loads dynamic packet capturing module, loads successfully, then application program continues to run with, and loading failure, then application program is out of service;Application program carries out data interaction with server by security application proxy module.The present invention exempts from Root without intrusion in entire data exchange process, each application program can load a dynamic packet capturing module, information channel between different application programs and server is independent of each other, the data that can be effectively isolated between different application prevent application program unauthorized access.

Description

Safety communicating method and system of the Root without intrusion are exempted from based on android system
Technical field
The present invention relates to field of communication security, and in particular to a kind of to exempt from peaces of the Root without intrusion based on android system Full communication method and system.
Background technology
As the Android smart machines such as Android phone, Android tablets are poured in the working environment of enterprise, Enterprise staff handles company's related service by these smart machines, various while offering convenience property of mobile office is enjoyed Also in the information security that unconsciously threaten enterprise, Android intelligence system security breaches emerge in an endless stream for malicious attack, dislike Meaning software covers the sky and the earth, and enterprise is made to be badly in need of the safety that equipment safe to use protects enterprise information system in the environment of mobile office Property.Existing security solution is to dispose traditional VPN device or security gateway equipment in Intranet entrance, passes through VPN Equipment or security gateway equipment isolation features carry out Network Isolation and Border Protection to Intranet.
VPN device establishes secure tunnel on Android smart machines using Microsoft Loopback Adapter, and information system client passes through The secure tunnel that Microsoft Loopback Adapter is established carries out data interaction with information system server, but such security solution exists Problems with:The application identity in tunnel safe to use is indefinite, and rogue program can also channel access enterprise safe to use Internal network puts intranet into capable attack, steals enterprise's sensitive information;Entire intelligent terminal can only have a safe tunnel Road, data cannot be isolated between each application system, may lead to application system client unauthorized access other application system Server data, there are security risks.
Conventional security gateway, using Root authority is obtained, network packet module is integrated in Android intelligent terminal Into operating system, application system network packet is realized by adapter system correlation function, which has the following problems:It needs Root authority is obtained, by invading adapter system correlation function, obtaining Root technologies can use according to different intelligent terminals Different Root schemes, technical sophistication and success rate is low;After obtaining Root authority, rogue program can obtain Root authority, cause Entire intelligent terminal is controlled, and then bigger is caused to endanger Intranet.
Therefore, it works out and a kind of Root is exempted from without invading and logical with individual secure channel based on android system Letter method and system have very important significance.
Invention content
In view of this, the application provide it is a kind of based on android system exempt from safety communicating methods of the Root without intrusion and System by being implanted into security client and dynamic packet capturing module in Android intelligent terminal, makes working as Android intelligent terminal Preceding application program with server carry out data interaction before advanced Mobile state packet capturing module loading, after loading successfully, current application Program carries out data interaction by the security application proxy module that security client and dynamic packet capturing module are shared and server again, Entire data exchange process exempts from Root without intrusion, not only independent but also safety.The invention is realized by the following technical scheme:
Safety communicating methods of the Root without intrusion is exempted from based on android system, this method is used to implement Android intelligence Data safety between equipment and server interacts, including:
Dynamic packet capturing module is implanted into Android smart machines and includes the security client of security application proxy module End module;
Start the application program of Android smart machines;
Application program loads dynamic packet capturing module, loads successfully, then application program continues to run with, and loading failure is then applied Program stopped is run;
Application program carries out data interaction with server by security application proxy module.
Further, the application program loading dynamic packet capturing module includes:
Application program actively loads dynamic packet capturing module;
Dynamic packet capturing module is downloaded security strategy from security client end module and is parsed;
Dynamic packet capturing module differentiates that whether safe current application program is legal according to the security strategy after parsing, if so, Then application program continues to run with, if it is not, then application program is out of service;
The network connection that dynamic packet capturing module is used current application program by the AOP frames of Android smart machines Module is reflected into TSM Security Agent module, and application program successfully will be in dynamic packet capturing module loading to application program network frame.
Further, the application program is included with server by the progress data interaction of security application proxy module:
Network interface in application call network connecting module;
Dynamic packet capturing module calls the security application proxy module of security client end module;
The network interface of application call is transmitted to TSM Security Agent mould by the AOP frames of Android smart machines automatically Block;
Application program sends the data to TSM Security Agent module;
The data received from application program are sent to server by TSM Security Agent module.
Further, the application program is further included with server by the progress data interaction of security application proxy module:
Server sends data to TSM Security Agent module;
The data received from server are sent to the AOP frames of Android smart machines by TSM Security Agent module;
Application program receives data automatically by the AOP frames of Android smart machines.
Further, it is further included before application program carries out data interaction with server by security application proxy module: User identity discriminating is carried out to server by security client end module, if server security is legal, carries out data interaction, Conversely, then without data interaction.
A kind of to exempt from safe communication systems of the Root without intrusion based on android system, which is led to by above-mentioned safety Letter method realizes that data safety interacts between Android smart machines and server, and the safe communication system includes:
Dynamic packet capturing module:Android smart machines are implanted in, for for the application program in Android smart machines It is loaded;
Security client end module:Android smart machines are implanted in, for providing safe plan for the dynamic packet capturing module Slightly;
Include security application proxy module in the security client end module, the dynamic packet capturing module calls institute automatically Security application proxy module is stated, the security application proxy module is used to provide peace for the data interaction of application program and server-side Full tunnel.
Further, the dynamic packet capturing module includes:
Security policy manager module:For downloading security strategy from the security client end module and parsing;
Application program identification module:For differentiating whether current application program closes safely according to the security strategy after parsing Method;
Network frame dlm (dynamic loading module):For being loaded into the application program network frame of Android smart machines.
Further, the security client end module is additionally provided with security strategy and issues module, and the security strategy issues Module is used to provide security strategy for dynamic packet capturing module.
Further, the security client end module is additionally provided with user identity identification module, and the user identity differentiates Whether safety is legal for authentication server for module.
During using the present invention, first, without obtaining Root authority, it can realize the data interaction for exempting from Root non-intrudings, have Effect has prevented to obtain the security risk that system Root authority is brought;Secondly, each application program exists in Android smart machines Will one dynamic packet capturing module of loading, and pass through security application proxy module and realize communication between server.Therefore, no Information channel between same application program and server is independent of each other, can be effectively isolated between different application Data prevent application program unauthorized access.In addition, the present invention can accurately identify application program, whether safety is legal, can shut out Exhausted Malware threatens to Intranet.
Description of the drawings
Fig. 1 is the communication means flow chart that the embodiment of the present invention 1 provides.
Fig. 2 is the particular flow sheet that the application program that the embodiment of the present invention 1 provides loads dynamic packet capturing module.
Fig. 3 is that the application program that the embodiment of the present invention 1 provides carries out data with server by security application proxy module Interactive particular flow sheet.
Fig. 4 is the structure diagram of communication system that the embodiment of the present invention 2 provides.
Specific embodiment
It is below in conjunction with the accompanying drawings and specific real in order to which those skilled in the art is made to more fully understand technical scheme of the present invention Applying example, the present invention is described in further detail.
Embodiment 1
As shown in Figure 1, secure communication sides of the Root without intrusion is exempted from based on android system the present embodiment provides a kind of Method, the data safety that this method is used to implement between Android smart machines and server interact, including:
Step S1:Dynamic packet capturing module is implanted into Android smart machines and includes security application proxy module Security client end module;
Step S2:Start the application program of Android smart machines;
Step S3:Application program loads dynamic packet capturing module, loads successfully, then application program continues to run with, loading failure, Then application program is out of service;
Step S4:Application program carries out data interaction with server by security application proxy module.
Specifically, as shown in Fig. 2, the loading of application program described in step S4 dynamic packet capturing module includes:
Step S301:Application program actively loads dynamic packet capturing module;
Step S302:Dynamic packet capturing module is downloaded security strategy from security client end module and is parsed;
Step S303:Dynamic packet capturing module differentiates whether current application program closes safely according to the security strategy after parsing Method, if it is, application program continues to run with, if it is not, then application program is out of service;
Step S304:Dynamic packet capturing module is used current application program by the AOP frames of Android smart machines Network connecting module is reflected into TSM Security Agent module, and application program is successfully by dynamic packet capturing module loading to application program network frame In frame.
Specifically, as shown in figure 3, application program described in step S4 and server by security application proxy module into line number Include according to interaction:
Step S401:Network interface in application call network connecting module;
Step S402:Dynamic packet capturing module calls the security application proxy module of security client end module;
Step S403:The network interface of application call is transmitted to peace by the AOP frames of Android smart machines automatically Full Proxy module;
Step S404:Application program sends the data to TSM Security Agent module;
Step S405:The data received from application program are sent to server by TSM Security Agent module.
In the present embodiment, step S4 is further included:
Step S406:Server sends data to TSM Security Agent module;
Step S407:The data received from server are sent to the AOP of Android smart machines by TSM Security Agent module Frame;
Step S408:Application program receives data automatically by the AOP frames of Android smart machines.
Preferably, it is further included before application program carries out data interaction with server by security application proxy module: User identity discriminating is carried out to server by security client end module, if server security is legal, carries out data interaction, Conversely, then without data interaction.
Wherein, AOP refers to extract for business procession the midsagittal plane, and what it was faced is certain in processing procedure A step or stage, to obtain the specific function of the lower coupling in logical process between various pieces.
When implementing the present embodiment, the application program in Android smart machines can be obtained and be referred to when using network connection Determine the network packet of application program, the safety transparent agency of network data is realized, without obtaining Android smart machines Root Permission without invading android system, can precisely identify different application, it is often more important that, during using the present invention, The different application of Android smart machines is by different escape way and server communication, mutual number According to completely isolated, the safety of Intranet ensure that.
Embodiment 2
As shown in figure 4, secure communication systems of the Root without intrusion is exempted from based on android system the present embodiment provides a kind of System, the system realize that data are pacified by the safety communicating method that embodiment 1 provides between Android smart machines and server Full interaction, communication system include:
Dynamic packet capturing module:Android smart machines are implanted in, for for the application program in Android smart machines It is loaded;
Security client end module:Android smart machines are implanted in, for providing safe plan for the dynamic packet capturing module Slightly;
Include security application proxy module in the security client end module, the dynamic packet capturing module calls institute automatically Security application proxy module is stated, the security application proxy module is used to provide peace for the data interaction of application program and server-side Full tunnel.
Specifically, dynamic packet capturing module includes:
Security policy manager module:For downloading security strategy from the security client end module and parsing;
Application program identification module:For differentiating whether current application program closes safely according to the security strategy after parsing Method;
Network frame dlm (dynamic loading module):For being loaded into the application program network frame of Android smart machines.
Specifically, security client end module issues module including security strategy, and security strategy issues module for for dynamically Packet capturing module provides security strategy.
Preferably, the security client end module of the present embodiment further includes user identity identification module, user identity differentiates Whether safety is legal for authentication server for module.
When implementing the present embodiment, in the application initialization of Android smart machines, dynamic packet capturing module is loaded, It, can be by the class agency of android system AOP frames offer and reflection function, by dynamic after the success of dynamic packet capturing module loading Network frame dlm (dynamic loading module) in dynamic packet capturing module is loaded into current application journey by the Classloader in state packet capturing module In sequence, when application call network relevant interface, it will automatic to call to network frame dlm (dynamic loading module), network frame Network data is forwarded to server, application program identification mould by dynamic module when called, by security application proxy module Block can carry out intelligent recognition to current application program in operation, judge whether current application program is legal, due to each application Program is individually loaded with dynamic network packet capturing module, can intelligent recognition current application program it is whether legal, and by not With escape way and server communication, the data between different application are completely isolated, ensure that Intranet Safety.
It the above is only the preferred embodiment of the present invention, it is noted that above-mentioned preferred embodiment is not construed as pair The limitation of the present invention, protection scope of the present invention should be subject to claim limited range.For the art For those of ordinary skill, without departing from the spirit and scope of the present invention, several improvements and modifications can also be made, these change Protection scope of the present invention is also should be regarded as into retouching.

Claims (9)

1. exempting from safety communicating methods of the Root without intrusion based on android system, this method is used to implement Android and intelligently sets The standby data safety interaction between server, which is characterized in that including:
Dynamic packet capturing module is implanted into Android smart machines and includes the security client mould of security application proxy module Block;
Start the application program of Android smart machines;
Application program loads dynamic packet capturing module, loads successfully, then application program continues to run with, loading failure, then application program It is out of service;
Application program carries out data interaction with server by security application proxy module.
2. according to claim 1 exempt from safety communicating methods of the Root without intrusion based on android system, feature exists In the application program loading dynamic packet capturing module includes:
Application program actively loads dynamic packet capturing module;
Dynamic packet capturing module is downloaded security strategy from security client end module and is parsed;
Dynamic packet capturing module differentiates that whether safe current application program is legal according to the security strategy after parsing, if it is, should It is continued to run with program, if it is not, then application program is out of service;
The network connecting module that dynamic packet capturing module is used current application program by the AOP frames of Android smart machines TSM Security Agent module is reflected into, application program successfully will be in dynamic packet capturing module loading to application program network frame.
3. according to claim 1 exempt from safety communicating methods of the Root without intrusion based on android system, feature exists In the application program carries out data interaction by security application proxy module with server and includes:
Network interface in application call network connecting module;
Dynamic packet capturing module calls the security application proxy module of security client end module;
The network interface of application call is transmitted to TSM Security Agent module by the AOP frames of Android smart machines automatically;
Application program sends the data to TSM Security Agent module;
The data received from application program are sent to server by TSM Security Agent module.
4. according to claim 3 exempt from safety communicating methods of the Root without intrusion based on android system, feature exists In the application program carries out data interaction by security application proxy module with server and further includes:
Server sends data to TSM Security Agent module;
The data received from server are sent to the AOP frames of Android smart machines by TSM Security Agent module;
Application program receives data automatically by the AOP frames of Android smart machines.
5. according to claim 1 exempt from safety communicating methods of the Root without intrusion based on android system, feature exists In being further included before application program and server carry out data interaction by security application proxy module:Pass through security client Module to server carry out user identity discriminating, if server security is legal, carry out data interaction, conversely, then without Data interaction.
6. a kind of exempt from safe communication systems of the Root without intrusion based on android system, which passes through claim 1-5 Safety communicating method described in any one realizes that data safety interacts between Android smart machines and server, special Sign is that the safe communication system includes:
Dynamic packet capturing module:Android smart machines are implanted in, for being carried out for the application program in Android smart machines Loading;
Security client end module:Android smart machines are implanted in, for providing security strategy for the dynamic packet capturing module;
Include security application proxy module in the security client end module, the dynamic packet capturing module calls the peace automatically Full application proxy module, the security application proxy module are used to provide for the data interaction of application program and server-side safe logical Road.
7. it is according to claim 6 it is a kind of safe communication systems of the Root without intrusion is exempted from based on android system, it is special Sign is that the dynamic packet capturing module includes:
Security policy manager module:For downloading security strategy from the security client end module and parsing;
Application program identification module:For differentiating current application program according to the security strategy after parsing, whether safety is legal;
Network frame dlm (dynamic loading module):For being loaded into the application program network frame of Android smart machines.
8. it is according to claim 6 it is a kind of safe communication systems of the Root without intrusion is exempted from based on android system, it is special Sign is that the security client end module is additionally provided with security strategy and issues module, and the security strategy issues module for being Dynamic packet capturing module provides security strategy.
9. it is according to claim 8 it is a kind of safe communication systems of the Root without intrusion is exempted from based on android system, it is special Sign is that the security client end module is additionally provided with user identity identification module, and the user identity identification module is used to reflect Whether safety is legal for other server.
CN201711464695.9A 2017-12-28 2017-12-28 Root-free and non-invasive secure communication method and system based on Android system Active CN108154026B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711464695.9A CN108154026B (en) 2017-12-28 2017-12-28 Root-free and non-invasive secure communication method and system based on Android system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711464695.9A CN108154026B (en) 2017-12-28 2017-12-28 Root-free and non-invasive secure communication method and system based on Android system

Publications (2)

Publication Number Publication Date
CN108154026A true CN108154026A (en) 2018-06-12
CN108154026B CN108154026B (en) 2022-01-11

Family

ID=62462544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711464695.9A Active CN108154026B (en) 2017-12-28 2017-12-28 Root-free and non-invasive secure communication method and system based on Android system

Country Status (1)

Country Link
CN (1) CN108154026B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981662A (en) * 2019-03-31 2019-07-05 西安电子科技大学 A kind of safe communication system and method
CN110888795A (en) * 2018-09-11 2020-03-17 中数通信息有限公司 Method for acquiring APP security evaluation data
CN112804686A (en) * 2021-01-22 2021-05-14 中信银行股份有限公司 Risk identification method and device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060167891A1 (en) * 2005-01-27 2006-07-27 Blaisdell Russell C Method and apparatus for redirecting transactions based on transaction response time policy in a distributed environment
CN101083602A (en) * 2006-05-30 2007-12-05 国际商业机器公司 Method for sharing communication information using local proxy
US20070283317A1 (en) * 2006-03-17 2007-12-06 Organizational Strategies, Inc. Inter domain services manager
CN103152433A (en) * 2013-01-14 2013-06-12 广东电子工业研究院有限公司 Distributed server side framework and use, interaction and request processing method thereof
CN104239786A (en) * 2014-10-13 2014-12-24 北京奇虎科技有限公司 ROOT-free active defense configuration method and device
CN106020912A (en) * 2016-06-02 2016-10-12 北京元心科技有限公司 Cloud-based SELinux strategy loading method, device, terminal equipment and system
CN107133171A (en) * 2017-05-02 2017-09-05 山东浪潮通软信息科技有限公司 A kind of light weight AOP frameworks and its application method based on assembly type

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060167891A1 (en) * 2005-01-27 2006-07-27 Blaisdell Russell C Method and apparatus for redirecting transactions based on transaction response time policy in a distributed environment
US20070283317A1 (en) * 2006-03-17 2007-12-06 Organizational Strategies, Inc. Inter domain services manager
CN101083602A (en) * 2006-05-30 2007-12-05 国际商业机器公司 Method for sharing communication information using local proxy
CN103152433A (en) * 2013-01-14 2013-06-12 广东电子工业研究院有限公司 Distributed server side framework and use, interaction and request processing method thereof
CN104239786A (en) * 2014-10-13 2014-12-24 北京奇虎科技有限公司 ROOT-free active defense configuration method and device
CN106020912A (en) * 2016-06-02 2016-10-12 北京元心科技有限公司 Cloud-based SELinux strategy loading method, device, terminal equipment and system
CN107133171A (en) * 2017-05-02 2017-09-05 山东浪潮通软信息科技有限公司 A kind of light weight AOP frameworks and its application method based on assembly type

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888795A (en) * 2018-09-11 2020-03-17 中数通信息有限公司 Method for acquiring APP security evaluation data
CN110888795B (en) * 2018-09-11 2023-10-20 中数通信息有限公司 APP security evaluation data acquisition method
CN109981662A (en) * 2019-03-31 2019-07-05 西安电子科技大学 A kind of safe communication system and method
CN112804686A (en) * 2021-01-22 2021-05-14 中信银行股份有限公司 Risk identification method and device and storage medium

Also Published As

Publication number Publication date
CN108154026B (en) 2022-01-11

Similar Documents

Publication Publication Date Title
US11757941B2 (en) System and method for providing network and computer firewall protection with dynamic address isolation to a device
US20220159015A1 (en) System and method for providing data and device security between external and host devices
CN104811455B (en) A kind of cloud computing identity identifying method
CN105577662B (en) Terminal environments method of controlling security and server
US20120042382A1 (en) System and method for monitoring and analyzing multiple interfaces and multiple protocols
EP2132643B1 (en) System and method for providing data and device security between external and host devices
CN104468611A (en) Data security processing method and device based on dual-system switching
WO2009037700A2 (en) Remote computer access authentication using a mobile device
CN103973700A (en) Mobile terminal preset networking address firewall isolation application system
CN108154026A (en) Safety communicating method and system of the Root without intrusion are exempted from based on android system
CN113783871B (en) Micro-isolation protection system adopting zero trust architecture and protection method thereof
CN106888184A (en) Mobile terminal payment class application security method of payment and device
CN111314381A (en) Safety isolation gateway
CN106936846A (en) A kind of method for network access control and device based on WFP platforms
CN113014589A (en) 5G communication safety test method and system
CN115134344B (en) Control method and component of virtual machine console
CN103036883A (en) Secure communication method and system of secure server
CN103475491B (en) A kind of remote maintenance system logged in without cryptosecurity and implementation method
CN107566396A (en) A kind of method based on dynamic password enhancing server VPN protocol securitys
CN110557395B (en) Secure element access interface protocol adaptation method and device
CN101039324B (en) Method, system and apparatus for defending network virus
KR101592323B1 (en) System and method for remote server recovery
CN115150209A (en) Data processing method, industrial control system, electronic device, and storage medium
CN105701397B (en) A kind of application control method and device
CN106888186A (en) Mobile terminal payment class application security method of payment and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: No. 333, Yunhua Road, high tech Zone, Chengdu, Sichuan 610041

Patentee after: China Electronics Technology Network Security Technology Co.,Ltd.

Address before: No. 333, Yunhua Road, high tech Zone, Chengdu, Sichuan 610041

Patentee before: CHENGDU WESTONE INFORMATION INDUSTRY Inc.

CP01 Change in the name or title of a patent holder