CN108830075A - A kind of application program management-control method of SSR centralized management platform - Google Patents
A kind of application program management-control method of SSR centralized management platform Download PDFInfo
- Publication number
- CN108830075A CN108830075A CN201810606160.9A CN201810606160A CN108830075A CN 108830075 A CN108830075 A CN 108830075A CN 201810606160 A CN201810606160 A CN 201810606160A CN 108830075 A CN108830075 A CN 108830075A
- Authority
- CN
- China
- Prior art keywords
- application program
- managed
- trust
- white list
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the invention discloses a kind of application program management-control methods of SSR centralized management platform, including:Search application program to be managed;Operating system features library is obtained from white list data center;By the application program to be managed and the operating system features storehouse matching;The level of trust of application program to be managed is modified according to matching result;It whether there is application program to be managed after judgement modification level of trust;If it is, obtaining level of trust again and modifying, otherwise terminate.The process of application program search is combined with white list data center in the embodiment of the present invention, the application program to be managed searched is matched with white list data center, determine the level of trust of application program to be managed, make full use of the big data platform of white list, the perfect data source of application program level of trust, guarantee application program level of trust accurate data, in time, improve application program control efficiency.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of application program pipe of SSR centralized management platform
Prosecutor method.
Background technique
SSR (Server Security Reinforcement, operating system security enhance system) is based on advanced
ROST (Reinforcement Operating System Technique, intensified operation systems technology) technical know-how is from system
The security solution that bottom reinforces operating system, cardinal principle are by file, catalogue, process, registration table
With the forced symmetric centralization of service, the permission of original system administrator is effectively restricted and dispersed, is combined to file kimonos
The functions such as the integrity detection of business and safety damped area spilling, can upgrade common operating system from system, comply with
The grade III Standard of national information protection based on security rank server operating system safety, can be in real time common server operation
System upgrades from system, has the function of the safe practice of three-level, is fundamentally immunized existing various for operating system
Attack, such as:Virus, worm, hacker attack etc..
Since the application manifest in SSR separate unit management platform network is limited, for newly-increased application program, Bu Nengzong
It is to identify corresponding level of trust, affects application program control efficiency.
Summary of the invention
A kind of application program management-control method of SSR centralized management platform is provided in the embodiment of the present invention, it is existing to solve
Application program manages the problem of low efficiency in technology.
In order to solve the above-mentioned technical problem, the embodiment of the invention discloses following technical solutions:
The present invention provides a kind of application program management-control methods of SSR centralized management platform, including:
Search application program to be managed;
Operating system features library is obtained from white list data center;
By the application program to be managed and the operating system features storehouse matching;
The level of trust of application program to be managed is modified according to matching result;
It whether there is application program to be managed after judgement modification level of trust;
If it is, obtaining level of trust again and modifying, otherwise terminate.
Preferably, application program to be managed is searched to specifically include:
Whole application programs in operating system are searched;
Obtain the level of trust of each application program;
It is unknown or gray list application program as application program to be managed using the level of trust.
Preferably, operating system features library is obtained from the white list data center to specifically include:
Obtain OS Type and condition code;
The OS Type and condition code are sent to the white list data center;
Described document information is authenticated;
According to the OS Type search operation system features library after authentication.
Preferably, it is generated after server hardware information encryption of the described document information according to installation centralized management platform.
Preferably, the application program to be managed and the operating system features storehouse matching are specifically included:
Obtain application program SHA1 value to be managed;
By the SHA1 value and the operating system features storehouse matching.
Preferably, it is specifically included according to the level of trust that matching result modifies application program to be managed:
When described when managing application program and operating system features storehouse matching success, journey is applied wait manage by described
The level of trust of sequence is revised as white list;
When described when managing application program and the operating system features storehouse matching fails, the application to be managed is kept
The level of trust of program.
Preferably, level of trust is obtained again and is modified specifically includes:
Obtain application program SHA1 value to be managed;
The SHA1 value is sent to the white list data center;
It is matched according to the SHA1 value;
When the SHA1 value and the white list data center successful match, by the trust of the application program to be managed
Level modification is white list;
When it fails to match for the SHA1 value and the white list data center, by the trust of the application program to be managed
Level modification is blacklist.
Preferably, the method also includes:
Log in white list data center.
Preferably, white list data center is logged in specifically include:
Log on request is sent to the white list data center;
Condition code in the log on request is authenticated;
Allow to log in if authenticating result meets the condition of logging in, otherwise forbids logging in.
By above technical scheme as it can be seen that mutually tying the process of application program search and white list data center in the present invention
It closes, the application program to be managed searched is matched with white list data center, determine the trust of application program to be managed
Rank, makes full use of the big data platform of white list, and the perfect data source of application program level of trust guarantees application program
The accurate data of level of trust, in time, improve application program control efficiency.
Detailed description of the invention
It is illustrated more clearly that the embodiment of the present invention or technical solution in the prior art, it below will be to embodiment or existing
Attached drawing needed in technical description is briefly described, it should be apparent that, for those of ordinary skills,
Without creative efforts, it is also possible to obtain other drawings based on these drawings.
A kind of Fig. 1 process signal of the application program management-control method of SSR centralized management platform provided in an embodiment of the present invention
Figure;
The flow diagram of Fig. 2 method provided in an embodiment of the present invention for searching application program to be managed;
The flow diagram of Fig. 3 method provided in an embodiment of the present invention for obtaining operating system features library;
Fig. 4 flow diagram provided in an embodiment of the present invention for obtaining level of trust method for distinguishing again;
The process of the application program management-control method of Fig. 5 another kind SSR centralized management platform provided in an embodiment of the present invention is shown
It is intended to;
The flow diagram of Fig. 6 method provided in an embodiment of the present invention for logging in white list data center.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, below in conjunction with of the invention real
The attached drawing in example is applied, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementation
Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common
Technical staff's every other embodiment obtained without making creative work, all should belong to protection of the present invention
Range.
Referring to Fig. 1, a kind of process of the application program management-control method of SSR centralized management platform provided in an embodiment of the present invention
Schematic diagram, as shown in Figure 1, the application program management-control method of SSR provided in an embodiment of the present invention centralized management platform includes:
S10:Search application program to be managed.
Centralized management platform is an operating system, wherein installation, there are many application program, some programs are because of application range
It is wide or number of users is numerous can be set to white list automatically, but wherein also include the reliability rating of many application programs
Not in white list, if accidentally operation may cause strong influence to centralized management platform, therefore, it is necessary to centralized management
The application program installed on platform is searched, and determines application program to be managed, referring to fig. 2, the present invention is real for specific search step
The flow diagram of the method for searching application program to be managed of example offer is applied, as shown in Fig. 2, searching application program tool to be managed
Body includes:
S11:Whole application programs in operating system are searched.
S12:Obtain the level of trust of each application program.
S13:It is unknown or gray list application program as application program to be managed using the level of trust.
Whole application programs on centralized management platform are searched, the available trust etc. to whole application programs
Grade, wherein reliability rating includes white list, blacklist, gray list and unknown, is the application journey of white list for reliability rating
Sequence can directly be run, and the utility program operating system that reliability rating is blacklist can be forbidden running, because both are believed
It is determined when appointing the respective operations of grade, therefore does not need to be managed again, be gray list for reliability rating or unknown answer
It needs to manage it because not can determine that its safe coefficient with program, therefore as application program to be managed.
S20:Operating system features library is obtained from white list data center.
The embodiment of the present invention is realized based on white list data center, and in white list data involved in the embodiment of the present invention
The heart be the whole network white list data center, include different server configuration under various operating systems in can be safely operated it is complete
Portion's application data, and included in the form of operating system features library, when judging whether an application program can be with
When being set as white list, it is necessary first to operating system features library is obtained, referring to Fig. 3, acquisition operation provided in an embodiment of the present invention
The flow diagram of the method in system features library, as shown in figure 3, obtaining operating system features library from the white list data center
It specifically includes:
S21:Obtain OS Type and condition code.
S21:The OS Type and condition code are sent to the white list data center.
S21:Described document information is authenticated.
S21:According to the OS Type search operation system features library after authentication.
Operating system features library includes various application informations and letter in a certain operating system under the configuration of a certain server
Appoint grade, application information is indicated with SHA1 value in operating system features library, therefore, in order to obtain operating system features
Library, it is necessary first to send OS Type and condition code to white list data center, white list data center to condition code into
Whether the source of row authentication, confirmation operation system type and condition code is reliable, when authenticating result indicates that the information is from the horse's mouth,
OS Type is judged again, obtains the corresponding operating system features library of the OS Type, wherein operating system
Type refers to specific OS Type and version number, such as windows 7x86 or centOs 5.0, condition code and installation
The server hardware information for managing platform is related, is generated after being encrypted according to hardware information.
S30:By the application program to be managed and the operating system features storehouse matching.
It gets operating system features library and needs to search the application program and operating system features to be managed obtained later
The application program saved in library is compared, and is determined using the reliability rating recorded in operating system features library as standard and is answered wait manage
With the reliability rating of program, because the application information in operating system features library is saved in the form of SHA1 value, first
First need to obtain application program SHA1 value to be managed, it then will be in the SHA1 value of application program be managed and operating system features library
SHA1 value matched.
S40:The level of trust of application program to be managed is modified according to matching result.
It will appear two after SHA1 value wait manage application program is matched with the SHA1 value in operating system features library
Kind of situation, a kind of situation are that can be matched to identical SHA1 value, illustrate application program to be managed and operating system features library
With success, the level of trust of the application program to be managed is revised as white list (because operating system features library is from white list
Data center obtains, therefore the reliability rating of the application program wherein saved is white list), another situation is that can not match
To identical SHA1 value, illustrate that application program to be managed and operating system features storehouse matching fail, but application program to be managed
It can not illustrate that the reliability rating of the application program is not white list with the failure of operating system features storehouse matching, can be because should
Application program was not run in the operating system, matched can not be worth, it is therefore desirable to first by it fails to match wait manage
The level of trust of application program remains unchanged.
S50:It whether there is application program to be managed after judgement modification level of trust.
After whole application matches, in order to more fully determine the reliability rating of application program, need
Judge whether to need to be managed application program, and judge whether there is the application program to be managed that it fails to match, if there is then executing
Step S60:Level of trust is obtained again and is modified, and is terminated if not.
Referring to fig. 4, the flow diagram provided in an embodiment of the present invention for obtaining level of trust method for distinguishing again, such as Fig. 4 institute
Show, obtains level of trust again and modification specifically includes:
S61:Obtain application program SHA1 value to be managed.
S62:The SHA1 value is sent to the white list data center.
S63:It is matched according to the SHA1 value.
When the SHA1 value and the white list data center successful match, step S64 is executed:It is answered described wait manage
White list is revised as with the level of trust of program.
When it fails to match for the SHA1 value and the white list data center, step S65 is executed:It is answered described wait manage
Blacklist is revised as with the level of trust of program.
It, will be in order to avoid certain application program because the case where there is no matching objects for operation for the first time in certain operating system
The SHA1 value for the application program to be managed that it fails to match in operating system features library is transmitted directly to white list data center, dialogue
The application program under all operationss system type in list data center is matched, if it is possible to be matched to identical SHA1
Value then illustrates that being somebody's turn to do application program to be managed is to run for the first time on this system, and reliability rating can be white list, if again
It fails to match then illustrates that the reliability rating of the application program to be managed really is blacklist.
Referring to Fig. 5, the stream of the application program management-control method of another kind SSR centralized management platform provided in an embodiment of the present invention
Journey schematic diagram, as shown in figure 5, the application program management-control method of SSR provided in an embodiment of the present invention centralized management platform further includes:
S70:Log in white list data center.
Managing platform and white list data center concentratedly is two mutually independent systems, in order to prevent to white list data
Information in center carries out arbitrarily modification to influence its accuracy, when accessing white list data center firstly the need of being stepped on
Record, referring to the flow diagram of Fig. 6 method provided in an embodiment of the present invention for logging in white list data center, as shown in fig. 6, stepping on
Land white list data center specifically includes:
S71:Log on request is sent to the white list data center.
S72:Condition code in the log on request is authenticated.
If authenticating result, which meets the condition of logging in, thens follow the steps S73:Allow to log in, it is no to then follow the steps S74:Forbid stepping on
Land.
Platform is managed concentratedly when logging in white list data center, it is necessary first to send logging request, wrap in logging request
The condition code (equivalent to the username and password) of the centralized management platform is included, white list data center reflects to condition code
Power, determines whether source reliable, if it is from the horse's mouth meet log in conditions permit and log in, do not met if source is unreliable
The condition of logging in forbids logging in.
The condition code sent when the condition code sent when logging in white list data center and acquisition operating system features library
For same condition code, the former purpose is in order to which whether the identity to determining centralized management platform is reliable, and the latter is for determination
Whether the request source for obtaining operating system features library is reliable.
It should be noted that the embodiment of the present invention can be online using that can also use, online in use, concentrating offline
Management platform and white list data center pass through network and directly carry out data communication, offline in use, centralized management platform is not required to
White list data center is logged in, data interaction between the two needs user to import and export manually.
The above is only a specific embodiment of the invention, is made skilled artisans appreciate that or realizing this hair
It is bright.Various modifications to these embodiments will be apparent to one skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (9)
1. a kind of application program management-control method of SSR centralized management platform, which is characterized in that including:
Search application program to be managed;
Operating system features library is obtained from white list data center;
By the application program to be managed and the operating system features storehouse matching;
The level of trust of application program to be managed is modified according to matching result;
It whether there is application program to be managed after judgement modification level of trust;
If it is, obtaining level of trust again and modifying, otherwise terminate.
2. being specifically included the method according to claim 1, wherein searching application program to be managed:
Whole application programs in operating system are searched;
Obtain the level of trust of each application program;
It is unknown or gray list application program as application program to be managed using the level of trust.
3. the method according to claim 1, wherein obtaining operating system features from the white list data center
Library specifically includes:
Obtain OS Type and condition code;
The OS Type and condition code are sent to the white list data center;
Described document information is authenticated;
According to the OS Type search operation system features library after authentication.
4. according to the method described in claim 3, it is characterized in that, described document information manages the service of platform concentratedly according to installation
It is generated after the encryption of device hardware information.
5. the method according to claim 1, wherein the application program to be managed and the operating system is special
Sign storehouse matching specifically includes:
Obtain application program SHA1 value to be managed;
By the SHA1 value and the operating system features storehouse matching.
6. the method according to claim 1, wherein modifying the trust of application program to be managed according to matching result
Rank specifically includes:
When described when managing application program and operating system features storehouse matching success, by the application program to be managed
Level of trust is revised as white list;
When described when managing application program and the operating system features storehouse matching fails, the application program to be managed is kept
Level of trust.
7. being specifically included the method according to claim 1, wherein obtaining level of trust again and modifying:
Obtain application program SHA1 value to be managed;
The SHA1 value is sent to the white list data center;
It is matched according to the SHA1 value;
When the SHA1 value and the white list data center successful match, by the level of trust of the application program to be managed
It is revised as white list;
When it fails to match for the SHA1 value and the white list data center, by the level of trust of the application program to be managed
It is revised as blacklist.
8. -7 any method according to claim 1, which is characterized in that the method also includes:
Log in white list data center.
9. according to the method described in claim 8, being specifically included it is characterized in that, logging in white list data center:
Log on request is sent to the white list data center;
Condition code in the log on request is authenticated;
Allow to log in if authenticating result meets the condition of logging in, otherwise forbids logging in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810606160.9A CN108830075A (en) | 2018-06-13 | 2018-06-13 | A kind of application program management-control method of SSR centralized management platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810606160.9A CN108830075A (en) | 2018-06-13 | 2018-06-13 | A kind of application program management-control method of SSR centralized management platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108830075A true CN108830075A (en) | 2018-11-16 |
Family
ID=64143931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810606160.9A Pending CN108830075A (en) | 2018-06-13 | 2018-06-13 | A kind of application program management-control method of SSR centralized management platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108830075A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110750778A (en) * | 2019-09-29 | 2020-02-04 | 苏州浪潮智能科技有限公司 | Application program control method and device |
CN114003904A (en) * | 2021-12-31 | 2022-02-01 | 北京微步在线科技有限公司 | Information sharing method, device, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101937500A (en) * | 2009-06-29 | 2011-01-05 | 深圳市联软科技有限公司 | Computer terminal security protection method and system |
CN102638617A (en) * | 2012-03-30 | 2012-08-15 | 中国科学技术大学苏州研究院 | Active response system based on intrusion detection for Android mobile phones |
US20140123269A1 (en) * | 2012-10-25 | 2014-05-01 | Check Point Software Technologies Ltd. | Filtering of applications for access to an enterprise network |
CN105930726A (en) * | 2016-04-20 | 2016-09-07 | 广东欧珀移动通信有限公司 | Processing method for malicious operation behavior and user terminal |
CN107766731A (en) * | 2017-09-22 | 2018-03-06 | 郑州云海信息技术有限公司 | A kind of anti-virus attack realization method and system based on application program management and control |
CN107944232A (en) * | 2017-12-08 | 2018-04-20 | 郑州云海信息技术有限公司 | A kind of design method and system of the Active Defending System Against based on white list technology |
-
2018
- 2018-06-13 CN CN201810606160.9A patent/CN108830075A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101937500A (en) * | 2009-06-29 | 2011-01-05 | 深圳市联软科技有限公司 | Computer terminal security protection method and system |
CN102638617A (en) * | 2012-03-30 | 2012-08-15 | 中国科学技术大学苏州研究院 | Active response system based on intrusion detection for Android mobile phones |
US20140123269A1 (en) * | 2012-10-25 | 2014-05-01 | Check Point Software Technologies Ltd. | Filtering of applications for access to an enterprise network |
CN105930726A (en) * | 2016-04-20 | 2016-09-07 | 广东欧珀移动通信有限公司 | Processing method for malicious operation behavior and user terminal |
CN107766731A (en) * | 2017-09-22 | 2018-03-06 | 郑州云海信息技术有限公司 | A kind of anti-virus attack realization method and system based on application program management and control |
CN107944232A (en) * | 2017-12-08 | 2018-04-20 | 郑州云海信息技术有限公司 | A kind of design method and system of the Active Defending System Against based on white list technology |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110750778A (en) * | 2019-09-29 | 2020-02-04 | 苏州浪潮智能科技有限公司 | Application program control method and device |
CN114003904A (en) * | 2021-12-31 | 2022-02-01 | 北京微步在线科技有限公司 | Information sharing method, device, computer equipment and storage medium |
CN114003904B (en) * | 2021-12-31 | 2022-03-08 | 北京微步在线科技有限公司 | Information sharing method, device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105871838B (en) | A kind of log-in control method and customer center platform of third party's account | |
US9148435B2 (en) | Establishment of a trust index to enable connections from unknown devices | |
US7353282B2 (en) | Methods and systems for sharing a network resource with a user without current access | |
US8689276B2 (en) | System and method for controlling access to files | |
CN100583114C (en) | System and method for remote security enablement | |
US10623958B2 (en) | Authorization of authentication | |
US9647993B2 (en) | Multi-repository key storage and selection | |
US20130125217A1 (en) | Authorization Control | |
US9509672B1 (en) | Providing seamless and automatic access to shared accounts | |
US10891357B2 (en) | Managing the display of hidden proprietary software code to authorized licensed users | |
US11063942B2 (en) | Enhanced authentication method using dynamic geographical location information | |
CN112838951B (en) | Operation and maintenance method, device and system of terminal equipment and storage medium | |
CN106685955B (en) | Radius-based video monitoring platform security authentication method | |
CN110795174A (en) | Application program interface calling method, device, equipment and readable storage medium | |
CN108830075A (en) | A kind of application program management-control method of SSR centralized management platform | |
US11170080B2 (en) | Enforcing primary and secondary authorization controls using change control record identifier and information | |
CN108809930B (en) | User authority management method and device | |
US7523488B2 (en) | Method for performing data access transformation with request authorization processing | |
CN103428191A (en) | Single sign on method based on combination of CAS framework and fingerprint | |
CN111953637B (en) | Application service method and device | |
CN114006735B (en) | Data protection method, device, computer equipment and storage medium | |
US20220255970A1 (en) | Deploying And Maintaining A Trust Store To Dynamically Manage Web Browser Extensions On End User Computing Devices | |
CN114493901A (en) | Data access application processing method and device, computer equipment and storage medium | |
JP2007041829A (en) | Database authority management system | |
CN113704798B (en) | Cross-platform mobile online learning method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181116 |
|
RJ01 | Rejection of invention patent application after publication |