CN109756362B - Integrated processing method and device for third-party security component - Google Patents

Integrated processing method and device for third-party security component Download PDF

Info

Publication number
CN109756362B
CN109756362B CN201811405769.6A CN201811405769A CN109756362B CN 109756362 B CN109756362 B CN 109756362B CN 201811405769 A CN201811405769 A CN 201811405769A CN 109756362 B CN109756362 B CN 109756362B
Authority
CN
China
Prior art keywords
security
resource pool
party
virtual
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811405769.6A
Other languages
Chinese (zh)
Other versions
CN109756362A (en
Inventor
鲍坤夫
刘浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianxin Technology Group Co Ltd
Original Assignee
Qianxin Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qianxin Technology Group Co Ltd filed Critical Qianxin Technology Group Co Ltd
Priority to CN201811405769.6A priority Critical patent/CN109756362B/en
Publication of CN109756362A publication Critical patent/CN109756362A/en
Application granted granted Critical
Publication of CN109756362B publication Critical patent/CN109756362B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses an integrated processing method and device of a third-party security component, wherein the method comprises the following steps: receiving the mirror image of the virtual security device sent by the third-party security component; judging whether the virtual security equipment supports log forwarding in a preset format or not; and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade. According to the embodiment of the invention, the virtual security device sent by the third-party security component is judged, and the third-party security component is integrated into the cloud security resource pool by differentiating different levels, so that the third-party security component can be accessed into the security resource pool as required, the security capability of the security resource pool is maximized, and the cloud security protection capability and the operation and maintenance efficiency of a user are improved.

Description

Integrated processing method and device for third-party security component
Technical Field
The embodiment of the invention relates to the technical field of network security, in particular to an integrated processing method and device of a third-party security component.
Background
In a general implementation of a cloud security resource pool, access of a virtual security device (NFV) must be a product of self-research by a security manufacturer or OEM (Original integrated manufacturing equipment), and it is difficult for an NFV device of a third party manufacturer to access the security resource pool, but from the benefit of a user, security capabilities of each security manufacturer are different, and the security resource pool needs to access NFV devices of multiple security manufacturers to maximize the security capabilities, so that an integration method of a third party security component is urgently needed at present.
Disclosure of Invention
Because the existing methods have the above problems, embodiments of the present invention provide an integrated processing method and apparatus for a third-party security component.
In a first aspect, an embodiment of the present invention provides an integrated processing method for a third-party security component, including:
receiving a mirror image of the virtual security device sent by the third-party security component;
judging whether the virtual security equipment supports log forwarding in a preset format or not;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade.
Optionally, if the virtual security device supports log forwarding in a preset format, integrating the third-party security component into the cloud security resource pool by using a corresponding level, specifically including:
and if the virtual security equipment supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized management and control interface, integrating the third-party security component into a cloud security resource pool by adopting a corresponding grade.
Optionally, if the virtual security device supports log forwarding in a preset format, and the third-party security component uses a single sign-on and license centralized management and control interface, the third-party security component is integrated into the cloud security resource pool by using a corresponding level, which specifically includes:
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and integrates the third-party security component into a cloud security resource pool by adopting a corresponding grade.
Optionally, the configuration interface supports direct individual configuration or batch configuration of the virtual security device in a cloud security resource pool.
Optionally, the format of the image of the virtual security device includes qcow2, raw, or iso.
Optionally, the levels include level one, level two, and level three;
the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool;
in a corresponding manner, the first and second electrodes are,
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and then the third-party security component is integrated into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a first level.
In a second aspect, an embodiment of the present invention further provides an integrated processing apparatus for a third-party security component, including:
the mirror image receiving module is used for receiving the mirror image of the virtual security device sent by the third-party security component;
the device judging module is used for judging whether the virtual security device supports log forwarding in a preset format;
and the component integration module is used for integrating the third-party security component into the cloud security resource pool by adopting a corresponding grade if the virtual security device supports log forwarding in a preset format.
Optionally, the component integration module is specifically configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format and the third-party security component uses a single sign-on and license centralized management and control interface.
Optionally, the component integration module is specifically configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format, the third-party security component uses a single sign-on and license centralized management and control interface, and the virtual security device provides a configuration interface.
Optionally, the configuration interface supports direct individual configuration or batch configuration of the virtual security device in a cloud security resource pool.
Optionally, the format of the image of the virtual security device includes qcow2, raw, or iso.
Optionally, the levels include level one, level two, and level three;
the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool;
in a corresponding manner, the first and second electrodes are,
the component integration module is specifically configured to:
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and integrates the third-party security component into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a first level.
In a third aspect, an embodiment of the present invention further provides an electronic device, including:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, which when called by the processor are capable of performing the above-described methods.
In a fourth aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium storing a computer program, which causes the computer to execute the above method.
According to the technical scheme, the virtual security device sent by the third-party security component is judged, the different levels are distinguished, and the third-party security component is integrated into the cloud security resource pool, so that the third-party security component can be accessed into the security resource pool as required, the security capacity of the security resource pool is maximized, and the cloud security protection capacity and the operation and maintenance efficiency of the user are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating an integrated processing method of a third-party security component according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating the connection between a third-party security component and a security resource pool according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an integrated processing device of a third-party security component according to an embodiment of the present invention;
fig. 4 is a logic block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following further describes embodiments of the present invention with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Fig. 1 shows a flowchart of an integrated processing method of a third-party security component provided in this embodiment, including:
s101, receiving the mirror image of the virtual security device sent by the third-party security component.
Wherein the third party security component is a component to be integrated into a cloud security resource pool.
Specifically, the cloud security resource pool receives an image of the virtual security device sent by the third-party security component, and the format of the image of the virtual security device includes qcow2, raw or iso.
S102, judging whether the virtual safety equipment supports log forwarding in a preset format.
Wherein the preset format comprises a syslog format.
S103, if the virtual security device supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade.
The virtual security device that this embodiment sent through the security component of third party judges to distinguish different grades and integrate the security component of third party to cloud security resource pool, can make security component of third party insert the security resource pool as required, make the security capacity maximize in security resource pool, promoted user's cloud security protection ability and fortune dimension efficiency.
Further, on the basis of the above method embodiment, S103 specifically includes:
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade.
Further, on the basis of the above method embodiment, S103 specifically includes:
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and integrates the third-party security component into a cloud security resource pool by adopting a corresponding grade.
The configuration interface supports direct individual configuration or batch configuration of the virtual security equipment in a cloud security resource pool.
Specifically, in order to solve the problem that it is difficult for a cloud security resource pool to access a third-party NFV device, the present embodiment provides that the access of the third-party NFV device to the security resource pool is divided into three levels, so as to ensure that NFV devices of different security vendors can be accessed as required.
Specifically, the levels include level one, level two, and level three; the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool.
Level one, a security manufacturer only needs to provide a mirror image of the virtual security device, and meanwhile, the virtual security device supports syslog forwarding, and the mirror image format of the virtual security device can be qcow2, raw or iso and the like; the level two, the security manufacturer needs to realize a single sign-on and license centralized control interface on the basis of the level one, through the single sign-on interface, the user can log in the virtual security device from the security resource pool without secret, through the license centralized control interface, the license can be automatically opened in the process of creating the virtual security device, and the process that the user independently opens the license is omitted, as shown in fig. 2; and in a third level, a security manufacturer needs to provide a configuration interface on the basis of the second level, and through the configuration interface, a user can directly configure the virtual security devices in the cloud security resource pool or configure the virtual security devices in batches. Each security manufacturer accesses the cloud security resource pool according to the own capability level, the higher the access level is, the better the adaptability of the cloud security resource pool is, and the security manufacturer is more convenient for users to use.
In response to this, the mobile terminal is allowed to,
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and then the third-party security component is integrated into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a first level.
Taking a government affair cloud project as an example, a security resource pool is to be built, and a virtual security component in the security resource pool is required to be derived from different security manufacturers, on one hand, the virtual security component is prevented from being bound by the security manufacturers, and on the other hand, the virtual security component is used for realizing the maximization of security capability, and for this scenario, the scheme provided in this embodiment is as follows:
the access capability of the security resource pool is divided into three levels, wherein the first level needs security manufacturers to provide virtual security component images and support syslog forwarding, the second level needs security manufacturers to support single sign-on and license centralized control, and the third level needs security manufacturers to support a northbound configuration interface to complete configuration of the virtual security components. Each safety manufacturer provides respective integration capability according to the access specification, the higher the access grade is, the better the adaptability to the safety resource pool is, and the more convenient the user is to use; after the security resource pool is accessed to all the security devices, the user can select various virtual security devices and configure security services according to the requirements of the user.
According to the method for accessing the third-party virtual security device to the cloud security resource pool, the opening capacity of the cloud security resource pool to all security manufacturers is guaranteed, all security manufacturers can access the security resource pool as required, the security capacity of the security resource pool is maximized, and the cloud security protection capacity and the operation and maintenance efficiency of users are improved.
Fig. 3 is a schematic structural diagram illustrating an integrated processing apparatus of a third-party security component according to this embodiment, where the apparatus includes: a mirror image receiving module 301, a device judging module 302, and a component integrating module 303, wherein:
the image receiving module 301 is configured to receive an image of a virtual security device sent by a third-party security component;
the device determining module 302 is configured to determine whether the virtual security device supports log forwarding in a preset format;
the component integration module 303 is configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format.
Specifically, the image receiving module 301 receives an image of a virtual security device sent by a third-party security component; the device determining module 302 determines whether the virtual security device supports log forwarding in a preset format; if the virtual security device supports log forwarding in a preset format, the component integration module 303 integrates the third-party security component into a cloud security resource pool by using a corresponding level.
The virtual security device that this embodiment sent through the security component of third party judges to distinguish different grades and integrate the security component of third party to cloud security resource pool, can make security component of third party insert the security resource pool as required, make the security capacity maximize in security resource pool, promoted user's cloud security protection ability and fortune dimension efficiency.
Further, on the basis of the foregoing apparatus embodiment, the component integrating module 303 is specifically configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format and the third-party security component uses a single sign-on and license centralized control interface.
Further, on the basis of the foregoing apparatus embodiment, the component integration module 303 is specifically configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format, the third-party security component uses a single sign-on and license centralized management and control interface, and the virtual security device provides a configuration interface.
Further, on the basis of the above apparatus embodiment, the configuration interface supports direct individual configuration or batch configuration of the virtual security device in a cloud security resource pool.
Further, on the basis of the above device embodiment, the format of the image of the virtual secure device includes qcow2, raw, or iso.
Further, on the basis of the above device embodiment, the grades include grade one, grade two and grade three;
the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool;
in a corresponding manner, the first and second electrodes are,
the component integration module 303 is specifically configured to:
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and then the third-party security component is integrated into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component into a cloud security resource pool by adopting a first level.
The integrated processing device of the third-party security component described in this embodiment may be configured to perform the method embodiments, and the principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, the electronic device includes: a processor (processor) 401, a memory (memory) 402, and a bus 403;
wherein, the first and the second end of the pipe are connected with each other,
the processor 401 and the memory 402 complete communication with each other through the bus 403;
the processor 401 is configured to call program instructions in the memory 402 to perform the methods provided by the above-described method embodiments.
The present embodiments disclose a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the methods provided by the above-described method embodiments.
The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the methods provided by the method embodiments described above.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on the understanding, the above technical solutions substantially or otherwise contributing to the prior art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the various embodiments or some parts of the embodiments.
It should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. An integrated processing method for a third party security component, comprising:
receiving a mirror image of the virtual security device sent by the third-party security component;
judging whether the virtual security equipment supports log forwarding in a preset format or not;
if the virtual security device supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade; the grades comprise a grade one, a grade two and a grade three;
the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool;
in a corresponding manner, the first and second electrodes are,
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and integrates the third-party security component into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component into a cloud security resource pool by adopting a first level.
2. The method of claim 1, wherein the configuration interface supports direct individual configuration or batch configuration of the virtual security appliance in a cloud security resource pool.
3. The method of claim 1 or 2, wherein the format of the image of the virtual secure device comprises qcow2, raw, or iso.
4. An integrated processing device of a third-party security component, comprising:
the mirror image receiving module is used for receiving the mirror image of the virtual security device sent by the third-party security component;
the device judging module is used for judging whether the virtual security device supports log forwarding in a preset format;
the component integration module is used for integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade if the virtual security device supports log forwarding in a preset format; the grades comprise a grade one, a grade two and a grade three; the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool; correspondingly, the component integration module is specifically configured to: if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and then the third-party security component is integrated into a cloud security resource pool by adopting a third level; if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two; and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a first level.
5. The apparatus of claim 4, wherein the configuration interface supports direct individual or batch configuration of the virtual security appliance in a cloud security resource pool.
6. The apparatus of claim 4 or 5, wherein the format of the image of the virtual security device comprises qcow2, raw, or iso.
7. An electronic device, comprising:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1 to 3.
8. A non-transitory computer-readable storage medium storing a computer program that causes a computer to perform the method according to any one of claims 1 to 3.
CN201811405769.6A 2018-11-23 2018-11-23 Integrated processing method and device for third-party security component Active CN109756362B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811405769.6A CN109756362B (en) 2018-11-23 2018-11-23 Integrated processing method and device for third-party security component

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811405769.6A CN109756362B (en) 2018-11-23 2018-11-23 Integrated processing method and device for third-party security component

Publications (2)

Publication Number Publication Date
CN109756362A CN109756362A (en) 2019-05-14
CN109756362B true CN109756362B (en) 2022-11-04

Family

ID=66403400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811405769.6A Active CN109756362B (en) 2018-11-23 2018-11-23 Integrated processing method and device for third-party security component

Country Status (1)

Country Link
CN (1) CN109756362B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114944952B (en) * 2022-05-20 2023-11-07 深信服科技股份有限公司 Data processing method, device, system, equipment and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102176723A (en) * 2011-03-25 2011-09-07 北京航空航天大学 Manufacturing cloud system for supporting on-demand use and dynamic collaboration of manufacturing resources and manufacturing capacities
CN105991734A (en) * 2015-02-16 2016-10-05 广东亿迅科技有限公司 Cloud platform management method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243512B (en) * 2013-06-07 2018-05-04 上海联影医疗科技有限公司 A kind of integrated approach of medical services
US9871822B2 (en) * 2014-11-28 2018-01-16 International Business Machines Corporation Deployment using a context-based cloud security assurance system
CN106330575A (en) * 2016-11-08 2017-01-11 上海有云信息技术有限公司 Safety service platform and safety service deployment method
CN107920023B (en) * 2017-12-29 2021-01-19 深信服科技股份有限公司 Method and system for realizing security resource pool
CN108809963A (en) * 2018-05-24 2018-11-13 中国科学院计算机网络信息中心 Secure resource sharing method, apparatus and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102176723A (en) * 2011-03-25 2011-09-07 北京航空航天大学 Manufacturing cloud system for supporting on-demand use and dynamic collaboration of manufacturing resources and manufacturing capacities
CN105991734A (en) * 2015-02-16 2016-10-05 广东亿迅科技有限公司 Cloud platform management method and system

Also Published As

Publication number Publication date
CN109756362A (en) 2019-05-14

Similar Documents

Publication Publication Date Title
EP3133767B1 (en) Authorization control method, client and server
CN104333863B (en) Connection management method and device, electronic equipment
EP3396905B1 (en) Method and device for securely sending a message
EP3490304B1 (en) Method for identifying access point and hotspot, and related products
CN109495542B (en) Load distribution method based on performance monitoring and terminal equipment
EP3206428A1 (en) Data traffic management method and device
CN106874232B (en) Charging method, device and terminal of Universal Serial Bus (USB)
CN111147425A (en) Data access processing method, device, equipment and storage medium
WO2019047708A1 (en) Resource configuration method and related product
CN106569917A (en) Data backup method and mobile terminal
CN109756362B (en) Integrated processing method and device for third-party security component
US10517077B2 (en) Method and apparatus for implementing mobile broadband device service
CN108540950B (en) Flow management method and device of double-card terminal and mobile terminal
US10045372B2 (en) Management of the use of a gateway by a plurality of terminals
CN105915639B (en) Page access method and device
CN113923130B (en) Multi-tenant open interface resource configuration method, device and terminal
CN112887155B (en) QoS (quality of service) associated information synchronization method and related product
CN114389868A (en) Method, system and device for distributing cloud resources and storage medium
CN105850165B (en) Terminal application control method, device and system based on near field communication technology
CN112417402A (en) Authority control method, authority control device and storage medium
CN112737827A (en) Resource allocation method, device and system
CN112689284B (en) Wireless network password modification method, device, equipment and storage medium
CN106899543B (en) Content access control method and related equipment
US10805167B2 (en) Accessibility of applications based on network connection type
CN115460676B (en) State management method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100088 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing

Applicant after: Qianxin Technology Group Co.,Ltd.

Address before: 100015 Jiuxianqiao Chaoyang District Beijing Road No. 10, building 15, floor 17, layer 1701-26, 3

Applicant before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
CB03 Change of inventor or designer information

Inventor after: Bao Kunfu

Inventor after: Liu Hao

Inventor before: Bao Kunfu

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant