CN108830075A - A kind of application program management-control method of SSR centralized management platform - Google Patents

A kind of application program management-control method of SSR centralized management platform Download PDF

Info

Publication number
CN108830075A
CN108830075A CN201810606160.9A CN201810606160A CN108830075A CN 108830075 A CN108830075 A CN 108830075A CN 201810606160 A CN201810606160 A CN 201810606160A CN 108830075 A CN108830075 A CN 108830075A
Authority
CN
China
Prior art keywords
application program
managed
trust
white list
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810606160.9A
Other languages
Chinese (zh)
Inventor
徐飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201810606160.9A priority Critical patent/CN108830075A/en
Publication of CN108830075A publication Critical patent/CN108830075A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a kind of application program management-control methods of SSR centralized management platform, including:Search application program to be managed;Operating system features library is obtained from white list data center;By the application program to be managed and the operating system features storehouse matching;The level of trust of application program to be managed is modified according to matching result;It whether there is application program to be managed after judgement modification level of trust;If it is, obtaining level of trust again and modifying, otherwise terminate.The process of application program search is combined with white list data center in the embodiment of the present invention, the application program to be managed searched is matched with white list data center, determine the level of trust of application program to be managed, make full use of the big data platform of white list, the perfect data source of application program level of trust, guarantee application program level of trust accurate data, in time, improve application program control efficiency.

Description

A kind of application program management-control method of SSR centralized management platform
Technical field
The present invention relates to field of information security technology, more particularly to a kind of application program pipe of SSR centralized management platform Prosecutor method.
Background technique
SSR (Server Security Reinforcement, operating system security enhance system) is based on advanced ROST (Reinforcement Operating System Technique, intensified operation systems technology) technical know-how is from system The security solution that bottom reinforces operating system, cardinal principle are by file, catalogue, process, registration table With the forced symmetric centralization of service, the permission of original system administrator is effectively restricted and dispersed, is combined to file kimonos The functions such as the integrity detection of business and safety damped area spilling, can upgrade common operating system from system, comply with The grade III Standard of national information protection based on security rank server operating system safety, can be in real time common server operation System upgrades from system, has the function of the safe practice of three-level, is fundamentally immunized existing various for operating system Attack, such as:Virus, worm, hacker attack etc..
Since the application manifest in SSR separate unit management platform network is limited, for newly-increased application program, Bu Nengzong It is to identify corresponding level of trust, affects application program control efficiency.
Summary of the invention
A kind of application program management-control method of SSR centralized management platform is provided in the embodiment of the present invention, it is existing to solve Application program manages the problem of low efficiency in technology.
In order to solve the above-mentioned technical problem, the embodiment of the invention discloses following technical solutions:
The present invention provides a kind of application program management-control methods of SSR centralized management platform, including:
Search application program to be managed;
Operating system features library is obtained from white list data center;
By the application program to be managed and the operating system features storehouse matching;
The level of trust of application program to be managed is modified according to matching result;
It whether there is application program to be managed after judgement modification level of trust;
If it is, obtaining level of trust again and modifying, otherwise terminate.
Preferably, application program to be managed is searched to specifically include:
Whole application programs in operating system are searched;
Obtain the level of trust of each application program;
It is unknown or gray list application program as application program to be managed using the level of trust.
Preferably, operating system features library is obtained from the white list data center to specifically include:
Obtain OS Type and condition code;
The OS Type and condition code are sent to the white list data center;
Described document information is authenticated;
According to the OS Type search operation system features library after authentication.
Preferably, it is generated after server hardware information encryption of the described document information according to installation centralized management platform.
Preferably, the application program to be managed and the operating system features storehouse matching are specifically included:
Obtain application program SHA1 value to be managed;
By the SHA1 value and the operating system features storehouse matching.
Preferably, it is specifically included according to the level of trust that matching result modifies application program to be managed:
When described when managing application program and operating system features storehouse matching success, journey is applied wait manage by described The level of trust of sequence is revised as white list;
When described when managing application program and the operating system features storehouse matching fails, the application to be managed is kept The level of trust of program.
Preferably, level of trust is obtained again and is modified specifically includes:
Obtain application program SHA1 value to be managed;
The SHA1 value is sent to the white list data center;
It is matched according to the SHA1 value;
When the SHA1 value and the white list data center successful match, by the trust of the application program to be managed Level modification is white list;
When it fails to match for the SHA1 value and the white list data center, by the trust of the application program to be managed Level modification is blacklist.
Preferably, the method also includes:
Log in white list data center.
Preferably, white list data center is logged in specifically include:
Log on request is sent to the white list data center;
Condition code in the log on request is authenticated;
Allow to log in if authenticating result meets the condition of logging in, otherwise forbids logging in.
By above technical scheme as it can be seen that mutually tying the process of application program search and white list data center in the present invention It closes, the application program to be managed searched is matched with white list data center, determine the trust of application program to be managed Rank, makes full use of the big data platform of white list, and the perfect data source of application program level of trust guarantees application program The accurate data of level of trust, in time, improve application program control efficiency.
Detailed description of the invention
It is illustrated more clearly that the embodiment of the present invention or technical solution in the prior art, it below will be to embodiment or existing Attached drawing needed in technical description is briefly described, it should be apparent that, for those of ordinary skills, Without creative efforts, it is also possible to obtain other drawings based on these drawings.
A kind of Fig. 1 process signal of the application program management-control method of SSR centralized management platform provided in an embodiment of the present invention Figure;
The flow diagram of Fig. 2 method provided in an embodiment of the present invention for searching application program to be managed;
The flow diagram of Fig. 3 method provided in an embodiment of the present invention for obtaining operating system features library;
Fig. 4 flow diagram provided in an embodiment of the present invention for obtaining level of trust method for distinguishing again;
The process of the application program management-control method of Fig. 5 another kind SSR centralized management platform provided in an embodiment of the present invention is shown It is intended to;
The flow diagram of Fig. 6 method provided in an embodiment of the present invention for logging in white list data center.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, below in conjunction with of the invention real The attached drawing in example is applied, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementation Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common Technical staff's every other embodiment obtained without making creative work, all should belong to protection of the present invention Range.
Referring to Fig. 1, a kind of process of the application program management-control method of SSR centralized management platform provided in an embodiment of the present invention Schematic diagram, as shown in Figure 1, the application program management-control method of SSR provided in an embodiment of the present invention centralized management platform includes:
S10:Search application program to be managed.
Centralized management platform is an operating system, wherein installation, there are many application program, some programs are because of application range It is wide or number of users is numerous can be set to white list automatically, but wherein also include the reliability rating of many application programs Not in white list, if accidentally operation may cause strong influence to centralized management platform, therefore, it is necessary to centralized management The application program installed on platform is searched, and determines application program to be managed, referring to fig. 2, the present invention is real for specific search step The flow diagram of the method for searching application program to be managed of example offer is applied, as shown in Fig. 2, searching application program tool to be managed Body includes:
S11:Whole application programs in operating system are searched.
S12:Obtain the level of trust of each application program.
S13:It is unknown or gray list application program as application program to be managed using the level of trust.
Whole application programs on centralized management platform are searched, the available trust etc. to whole application programs Grade, wherein reliability rating includes white list, blacklist, gray list and unknown, is the application journey of white list for reliability rating Sequence can directly be run, and the utility program operating system that reliability rating is blacklist can be forbidden running, because both are believed It is determined when appointing the respective operations of grade, therefore does not need to be managed again, be gray list for reliability rating or unknown answer It needs to manage it because not can determine that its safe coefficient with program, therefore as application program to be managed.
S20:Operating system features library is obtained from white list data center.
The embodiment of the present invention is realized based on white list data center, and in white list data involved in the embodiment of the present invention The heart be the whole network white list data center, include different server configuration under various operating systems in can be safely operated it is complete Portion's application data, and included in the form of operating system features library, when judging whether an application program can be with When being set as white list, it is necessary first to operating system features library is obtained, referring to Fig. 3, acquisition operation provided in an embodiment of the present invention The flow diagram of the method in system features library, as shown in figure 3, obtaining operating system features library from the white list data center It specifically includes:
S21:Obtain OS Type and condition code.
S21:The OS Type and condition code are sent to the white list data center.
S21:Described document information is authenticated.
S21:According to the OS Type search operation system features library after authentication.
Operating system features library includes various application informations and letter in a certain operating system under the configuration of a certain server Appoint grade, application information is indicated with SHA1 value in operating system features library, therefore, in order to obtain operating system features Library, it is necessary first to send OS Type and condition code to white list data center, white list data center to condition code into Whether the source of row authentication, confirmation operation system type and condition code is reliable, when authenticating result indicates that the information is from the horse's mouth, OS Type is judged again, obtains the corresponding operating system features library of the OS Type, wherein operating system Type refers to specific OS Type and version number, such as windows 7x86 or centOs 5.0, condition code and installation The server hardware information for managing platform is related, is generated after being encrypted according to hardware information.
S30:By the application program to be managed and the operating system features storehouse matching.
It gets operating system features library and needs to search the application program and operating system features to be managed obtained later The application program saved in library is compared, and is determined using the reliability rating recorded in operating system features library as standard and is answered wait manage With the reliability rating of program, because the application information in operating system features library is saved in the form of SHA1 value, first First need to obtain application program SHA1 value to be managed, it then will be in the SHA1 value of application program be managed and operating system features library SHA1 value matched.
S40:The level of trust of application program to be managed is modified according to matching result.
It will appear two after SHA1 value wait manage application program is matched with the SHA1 value in operating system features library Kind of situation, a kind of situation are that can be matched to identical SHA1 value, illustrate application program to be managed and operating system features library With success, the level of trust of the application program to be managed is revised as white list (because operating system features library is from white list Data center obtains, therefore the reliability rating of the application program wherein saved is white list), another situation is that can not match To identical SHA1 value, illustrate that application program to be managed and operating system features storehouse matching fail, but application program to be managed It can not illustrate that the reliability rating of the application program is not white list with the failure of operating system features storehouse matching, can be because should Application program was not run in the operating system, matched can not be worth, it is therefore desirable to first by it fails to match wait manage The level of trust of application program remains unchanged.
S50:It whether there is application program to be managed after judgement modification level of trust.
After whole application matches, in order to more fully determine the reliability rating of application program, need Judge whether to need to be managed application program, and judge whether there is the application program to be managed that it fails to match, if there is then executing Step S60:Level of trust is obtained again and is modified, and is terminated if not.
Referring to fig. 4, the flow diagram provided in an embodiment of the present invention for obtaining level of trust method for distinguishing again, such as Fig. 4 institute Show, obtains level of trust again and modification specifically includes:
S61:Obtain application program SHA1 value to be managed.
S62:The SHA1 value is sent to the white list data center.
S63:It is matched according to the SHA1 value.
When the SHA1 value and the white list data center successful match, step S64 is executed:It is answered described wait manage White list is revised as with the level of trust of program.
When it fails to match for the SHA1 value and the white list data center, step S65 is executed:It is answered described wait manage Blacklist is revised as with the level of trust of program.
It, will be in order to avoid certain application program because the case where there is no matching objects for operation for the first time in certain operating system The SHA1 value for the application program to be managed that it fails to match in operating system features library is transmitted directly to white list data center, dialogue The application program under all operationss system type in list data center is matched, if it is possible to be matched to identical SHA1 Value then illustrates that being somebody's turn to do application program to be managed is to run for the first time on this system, and reliability rating can be white list, if again It fails to match then illustrates that the reliability rating of the application program to be managed really is blacklist.
Referring to Fig. 5, the stream of the application program management-control method of another kind SSR centralized management platform provided in an embodiment of the present invention Journey schematic diagram, as shown in figure 5, the application program management-control method of SSR provided in an embodiment of the present invention centralized management platform further includes:
S70:Log in white list data center.
Managing platform and white list data center concentratedly is two mutually independent systems, in order to prevent to white list data Information in center carries out arbitrarily modification to influence its accuracy, when accessing white list data center firstly the need of being stepped on Record, referring to the flow diagram of Fig. 6 method provided in an embodiment of the present invention for logging in white list data center, as shown in fig. 6, stepping on Land white list data center specifically includes:
S71:Log on request is sent to the white list data center.
S72:Condition code in the log on request is authenticated.
If authenticating result, which meets the condition of logging in, thens follow the steps S73:Allow to log in, it is no to then follow the steps S74:Forbid stepping on Land.
Platform is managed concentratedly when logging in white list data center, it is necessary first to send logging request, wrap in logging request The condition code (equivalent to the username and password) of the centralized management platform is included, white list data center reflects to condition code Power, determines whether source reliable, if it is from the horse's mouth meet log in conditions permit and log in, do not met if source is unreliable The condition of logging in forbids logging in.
The condition code sent when the condition code sent when logging in white list data center and acquisition operating system features library For same condition code, the former purpose is in order to which whether the identity to determining centralized management platform is reliable, and the latter is for determination Whether the request source for obtaining operating system features library is reliable.
It should be noted that the embodiment of the present invention can be online using that can also use, online in use, concentrating offline Management platform and white list data center pass through network and directly carry out data communication, offline in use, centralized management platform is not required to White list data center is logged in, data interaction between the two needs user to import and export manually.
The above is only a specific embodiment of the invention, is made skilled artisans appreciate that or realizing this hair It is bright.Various modifications to these embodiments will be apparent to one skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (9)

1. a kind of application program management-control method of SSR centralized management platform, which is characterized in that including:
Search application program to be managed;
Operating system features library is obtained from white list data center;
By the application program to be managed and the operating system features storehouse matching;
The level of trust of application program to be managed is modified according to matching result;
It whether there is application program to be managed after judgement modification level of trust;
If it is, obtaining level of trust again and modifying, otherwise terminate.
2. being specifically included the method according to claim 1, wherein searching application program to be managed:
Whole application programs in operating system are searched;
Obtain the level of trust of each application program;
It is unknown or gray list application program as application program to be managed using the level of trust.
3. the method according to claim 1, wherein obtaining operating system features from the white list data center Library specifically includes:
Obtain OS Type and condition code;
The OS Type and condition code are sent to the white list data center;
Described document information is authenticated;
According to the OS Type search operation system features library after authentication.
4. according to the method described in claim 3, it is characterized in that, described document information manages the service of platform concentratedly according to installation It is generated after the encryption of device hardware information.
5. the method according to claim 1, wherein the application program to be managed and the operating system is special Sign storehouse matching specifically includes:
Obtain application program SHA1 value to be managed;
By the SHA1 value and the operating system features storehouse matching.
6. the method according to claim 1, wherein modifying the trust of application program to be managed according to matching result Rank specifically includes:
When described when managing application program and operating system features storehouse matching success, by the application program to be managed Level of trust is revised as white list;
When described when managing application program and the operating system features storehouse matching fails, the application program to be managed is kept Level of trust.
7. being specifically included the method according to claim 1, wherein obtaining level of trust again and modifying:
Obtain application program SHA1 value to be managed;
The SHA1 value is sent to the white list data center;
It is matched according to the SHA1 value;
When the SHA1 value and the white list data center successful match, by the level of trust of the application program to be managed It is revised as white list;
When it fails to match for the SHA1 value and the white list data center, by the level of trust of the application program to be managed It is revised as blacklist.
8. -7 any method according to claim 1, which is characterized in that the method also includes:
Log in white list data center.
9. according to the method described in claim 8, being specifically included it is characterized in that, logging in white list data center:
Log on request is sent to the white list data center;
Condition code in the log on request is authenticated;
Allow to log in if authenticating result meets the condition of logging in, otherwise forbids logging in.
CN201810606160.9A 2018-06-13 2018-06-13 A kind of application program management-control method of SSR centralized management platform Pending CN108830075A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810606160.9A CN108830075A (en) 2018-06-13 2018-06-13 A kind of application program management-control method of SSR centralized management platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810606160.9A CN108830075A (en) 2018-06-13 2018-06-13 A kind of application program management-control method of SSR centralized management platform

Publications (1)

Publication Number Publication Date
CN108830075A true CN108830075A (en) 2018-11-16

Family

ID=64143931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810606160.9A Pending CN108830075A (en) 2018-06-13 2018-06-13 A kind of application program management-control method of SSR centralized management platform

Country Status (1)

Country Link
CN (1) CN108830075A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110750778A (en) * 2019-09-29 2020-02-04 苏州浪潮智能科技有限公司 Application program control method and device
CN114003904A (en) * 2021-12-31 2022-02-01 北京微步在线科技有限公司 Information sharing method, device, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937500A (en) * 2009-06-29 2011-01-05 深圳市联软科技有限公司 Computer terminal security protection method and system
CN102638617A (en) * 2012-03-30 2012-08-15 中国科学技术大学苏州研究院 Active response system based on intrusion detection for Android mobile phones
US20140123269A1 (en) * 2012-10-25 2014-05-01 Check Point Software Technologies Ltd. Filtering of applications for access to an enterprise network
CN105930726A (en) * 2016-04-20 2016-09-07 广东欧珀移动通信有限公司 Processing method for malicious operation behavior and user terminal
CN107766731A (en) * 2017-09-22 2018-03-06 郑州云海信息技术有限公司 A kind of anti-virus attack realization method and system based on application program management and control
CN107944232A (en) * 2017-12-08 2018-04-20 郑州云海信息技术有限公司 A kind of design method and system of the Active Defending System Against based on white list technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937500A (en) * 2009-06-29 2011-01-05 深圳市联软科技有限公司 Computer terminal security protection method and system
CN102638617A (en) * 2012-03-30 2012-08-15 中国科学技术大学苏州研究院 Active response system based on intrusion detection for Android mobile phones
US20140123269A1 (en) * 2012-10-25 2014-05-01 Check Point Software Technologies Ltd. Filtering of applications for access to an enterprise network
CN105930726A (en) * 2016-04-20 2016-09-07 广东欧珀移动通信有限公司 Processing method for malicious operation behavior and user terminal
CN107766731A (en) * 2017-09-22 2018-03-06 郑州云海信息技术有限公司 A kind of anti-virus attack realization method and system based on application program management and control
CN107944232A (en) * 2017-12-08 2018-04-20 郑州云海信息技术有限公司 A kind of design method and system of the Active Defending System Against based on white list technology

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110750778A (en) * 2019-09-29 2020-02-04 苏州浪潮智能科技有限公司 Application program control method and device
CN114003904A (en) * 2021-12-31 2022-02-01 北京微步在线科技有限公司 Information sharing method, device, computer equipment and storage medium
CN114003904B (en) * 2021-12-31 2022-03-08 北京微步在线科技有限公司 Information sharing method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105871838B (en) A kind of log-in control method and customer center platform of third party's account
US9148435B2 (en) Establishment of a trust index to enable connections from unknown devices
US7353282B2 (en) Methods and systems for sharing a network resource with a user without current access
US8689276B2 (en) System and method for controlling access to files
CN100583114C (en) System and method for remote security enablement
US10623958B2 (en) Authorization of authentication
US9647993B2 (en) Multi-repository key storage and selection
US20130125217A1 (en) Authorization Control
US9509672B1 (en) Providing seamless and automatic access to shared accounts
US10891357B2 (en) Managing the display of hidden proprietary software code to authorized licensed users
US11063942B2 (en) Enhanced authentication method using dynamic geographical location information
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
CN106685955B (en) Radius-based video monitoring platform security authentication method
CN110795174A (en) Application program interface calling method, device, equipment and readable storage medium
CN108830075A (en) A kind of application program management-control method of SSR centralized management platform
US11170080B2 (en) Enforcing primary and secondary authorization controls using change control record identifier and information
CN108809930B (en) User authority management method and device
US7523488B2 (en) Method for performing data access transformation with request authorization processing
CN103428191A (en) Single sign on method based on combination of CAS framework and fingerprint
CN111953637B (en) Application service method and device
CN114006735B (en) Data protection method, device, computer equipment and storage medium
US20220255970A1 (en) Deploying And Maintaining A Trust Store To Dynamically Manage Web Browser Extensions On End User Computing Devices
CN114493901A (en) Data access application processing method and device, computer equipment and storage medium
JP2007041829A (en) Database authority management system
CN113704798B (en) Cross-platform mobile online learning method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181116

RJ01 Rejection of invention patent application after publication