CN109756362B - Integrated processing method and device for third-party security component - Google Patents
Integrated processing method and device for third-party security component Download PDFInfo
- Publication number
- CN109756362B CN109756362B CN201811405769.6A CN201811405769A CN109756362B CN 109756362 B CN109756362 B CN 109756362B CN 201811405769 A CN201811405769 A CN 201811405769A CN 109756362 B CN109756362 B CN 109756362B
- Authority
- CN
- China
- Prior art keywords
- security
- resource pool
- party
- virtual
- component
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The embodiment of the invention discloses an integrated processing method and device of a third-party security component, wherein the method comprises the following steps: receiving the mirror image of the virtual security device sent by the third-party security component; judging whether the virtual security equipment supports log forwarding in a preset format or not; and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade. According to the embodiment of the invention, the virtual security device sent by the third-party security component is judged, and the third-party security component is integrated into the cloud security resource pool by differentiating different levels, so that the third-party security component can be accessed into the security resource pool as required, the security capability of the security resource pool is maximized, and the cloud security protection capability and the operation and maintenance efficiency of a user are improved.
Description
Technical Field
The embodiment of the invention relates to the technical field of network security, in particular to an integrated processing method and device of a third-party security component.
Background
In a general implementation of a cloud security resource pool, access of a virtual security device (NFV) must be a product of self-research by a security manufacturer or OEM (Original integrated manufacturing equipment), and it is difficult for an NFV device of a third party manufacturer to access the security resource pool, but from the benefit of a user, security capabilities of each security manufacturer are different, and the security resource pool needs to access NFV devices of multiple security manufacturers to maximize the security capabilities, so that an integration method of a third party security component is urgently needed at present.
Disclosure of Invention
Because the existing methods have the above problems, embodiments of the present invention provide an integrated processing method and apparatus for a third-party security component.
In a first aspect, an embodiment of the present invention provides an integrated processing method for a third-party security component, including:
receiving a mirror image of the virtual security device sent by the third-party security component;
judging whether the virtual security equipment supports log forwarding in a preset format or not;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade.
Optionally, if the virtual security device supports log forwarding in a preset format, integrating the third-party security component into the cloud security resource pool by using a corresponding level, specifically including:
and if the virtual security equipment supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized management and control interface, integrating the third-party security component into a cloud security resource pool by adopting a corresponding grade.
Optionally, if the virtual security device supports log forwarding in a preset format, and the third-party security component uses a single sign-on and license centralized management and control interface, the third-party security component is integrated into the cloud security resource pool by using a corresponding level, which specifically includes:
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and integrates the third-party security component into a cloud security resource pool by adopting a corresponding grade.
Optionally, the configuration interface supports direct individual configuration or batch configuration of the virtual security device in a cloud security resource pool.
Optionally, the format of the image of the virtual security device includes qcow2, raw, or iso.
Optionally, the levels include level one, level two, and level three;
the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool;
in a corresponding manner, the first and second electrodes are,
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and then the third-party security component is integrated into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a first level.
In a second aspect, an embodiment of the present invention further provides an integrated processing apparatus for a third-party security component, including:
the mirror image receiving module is used for receiving the mirror image of the virtual security device sent by the third-party security component;
the device judging module is used for judging whether the virtual security device supports log forwarding in a preset format;
and the component integration module is used for integrating the third-party security component into the cloud security resource pool by adopting a corresponding grade if the virtual security device supports log forwarding in a preset format.
Optionally, the component integration module is specifically configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format and the third-party security component uses a single sign-on and license centralized management and control interface.
Optionally, the component integration module is specifically configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format, the third-party security component uses a single sign-on and license centralized management and control interface, and the virtual security device provides a configuration interface.
Optionally, the configuration interface supports direct individual configuration or batch configuration of the virtual security device in a cloud security resource pool.
Optionally, the format of the image of the virtual security device includes qcow2, raw, or iso.
Optionally, the levels include level one, level two, and level three;
the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool;
in a corresponding manner, the first and second electrodes are,
the component integration module is specifically configured to:
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and integrates the third-party security component into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a first level.
In a third aspect, an embodiment of the present invention further provides an electronic device, including:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, which when called by the processor are capable of performing the above-described methods.
In a fourth aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium storing a computer program, which causes the computer to execute the above method.
According to the technical scheme, the virtual security device sent by the third-party security component is judged, the different levels are distinguished, and the third-party security component is integrated into the cloud security resource pool, so that the third-party security component can be accessed into the security resource pool as required, the security capacity of the security resource pool is maximized, and the cloud security protection capacity and the operation and maintenance efficiency of the user are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating an integrated processing method of a third-party security component according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating the connection between a third-party security component and a security resource pool according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an integrated processing device of a third-party security component according to an embodiment of the present invention;
fig. 4 is a logic block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following further describes embodiments of the present invention with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Fig. 1 shows a flowchart of an integrated processing method of a third-party security component provided in this embodiment, including:
s101, receiving the mirror image of the virtual security device sent by the third-party security component.
Wherein the third party security component is a component to be integrated into a cloud security resource pool.
Specifically, the cloud security resource pool receives an image of the virtual security device sent by the third-party security component, and the format of the image of the virtual security device includes qcow2, raw or iso.
S102, judging whether the virtual safety equipment supports log forwarding in a preset format.
Wherein the preset format comprises a syslog format.
S103, if the virtual security device supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade.
The virtual security device that this embodiment sent through the security component of third party judges to distinguish different grades and integrate the security component of third party to cloud security resource pool, can make security component of third party insert the security resource pool as required, make the security capacity maximize in security resource pool, promoted user's cloud security protection ability and fortune dimension efficiency.
Further, on the basis of the above method embodiment, S103 specifically includes:
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade.
Further, on the basis of the above method embodiment, S103 specifically includes:
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and integrates the third-party security component into a cloud security resource pool by adopting a corresponding grade.
The configuration interface supports direct individual configuration or batch configuration of the virtual security equipment in a cloud security resource pool.
Specifically, in order to solve the problem that it is difficult for a cloud security resource pool to access a third-party NFV device, the present embodiment provides that the access of the third-party NFV device to the security resource pool is divided into three levels, so as to ensure that NFV devices of different security vendors can be accessed as required.
Specifically, the levels include level one, level two, and level three; the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool.
Level one, a security manufacturer only needs to provide a mirror image of the virtual security device, and meanwhile, the virtual security device supports syslog forwarding, and the mirror image format of the virtual security device can be qcow2, raw or iso and the like; the level two, the security manufacturer needs to realize a single sign-on and license centralized control interface on the basis of the level one, through the single sign-on interface, the user can log in the virtual security device from the security resource pool without secret, through the license centralized control interface, the license can be automatically opened in the process of creating the virtual security device, and the process that the user independently opens the license is omitted, as shown in fig. 2; and in a third level, a security manufacturer needs to provide a configuration interface on the basis of the second level, and through the configuration interface, a user can directly configure the virtual security devices in the cloud security resource pool or configure the virtual security devices in batches. Each security manufacturer accesses the cloud security resource pool according to the own capability level, the higher the access level is, the better the adaptability of the cloud security resource pool is, and the security manufacturer is more convenient for users to use.
In response to this, the mobile terminal is allowed to,
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and then the third-party security component is integrated into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a first level.
Taking a government affair cloud project as an example, a security resource pool is to be built, and a virtual security component in the security resource pool is required to be derived from different security manufacturers, on one hand, the virtual security component is prevented from being bound by the security manufacturers, and on the other hand, the virtual security component is used for realizing the maximization of security capability, and for this scenario, the scheme provided in this embodiment is as follows:
the access capability of the security resource pool is divided into three levels, wherein the first level needs security manufacturers to provide virtual security component images and support syslog forwarding, the second level needs security manufacturers to support single sign-on and license centralized control, and the third level needs security manufacturers to support a northbound configuration interface to complete configuration of the virtual security components. Each safety manufacturer provides respective integration capability according to the access specification, the higher the access grade is, the better the adaptability to the safety resource pool is, and the more convenient the user is to use; after the security resource pool is accessed to all the security devices, the user can select various virtual security devices and configure security services according to the requirements of the user.
According to the method for accessing the third-party virtual security device to the cloud security resource pool, the opening capacity of the cloud security resource pool to all security manufacturers is guaranteed, all security manufacturers can access the security resource pool as required, the security capacity of the security resource pool is maximized, and the cloud security protection capacity and the operation and maintenance efficiency of users are improved.
Fig. 3 is a schematic structural diagram illustrating an integrated processing apparatus of a third-party security component according to this embodiment, where the apparatus includes: a mirror image receiving module 301, a device judging module 302, and a component integrating module 303, wherein:
the image receiving module 301 is configured to receive an image of a virtual security device sent by a third-party security component;
the device determining module 302 is configured to determine whether the virtual security device supports log forwarding in a preset format;
the component integration module 303 is configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format.
Specifically, the image receiving module 301 receives an image of a virtual security device sent by a third-party security component; the device determining module 302 determines whether the virtual security device supports log forwarding in a preset format; if the virtual security device supports log forwarding in a preset format, the component integration module 303 integrates the third-party security component into a cloud security resource pool by using a corresponding level.
The virtual security device that this embodiment sent through the security component of third party judges to distinguish different grades and integrate the security component of third party to cloud security resource pool, can make security component of third party insert the security resource pool as required, make the security capacity maximize in security resource pool, promoted user's cloud security protection ability and fortune dimension efficiency.
Further, on the basis of the foregoing apparatus embodiment, the component integrating module 303 is specifically configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format and the third-party security component uses a single sign-on and license centralized control interface.
Further, on the basis of the foregoing apparatus embodiment, the component integration module 303 is specifically configured to integrate the third-party security component into the cloud security resource pool by using a corresponding level if the virtual security device supports log forwarding in a preset format, the third-party security component uses a single sign-on and license centralized management and control interface, and the virtual security device provides a configuration interface.
Further, on the basis of the above apparatus embodiment, the configuration interface supports direct individual configuration or batch configuration of the virtual security device in a cloud security resource pool.
Further, on the basis of the above device embodiment, the format of the image of the virtual secure device includes qcow2, raw, or iso.
Further, on the basis of the above device embodiment, the grades include grade one, grade two and grade three;
the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool;
in a corresponding manner, the first and second electrodes are,
the component integration module 303 is specifically configured to:
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and then the third-party security component is integrated into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component into a cloud security resource pool by adopting a first level.
The integrated processing device of the third-party security component described in this embodiment may be configured to perform the method embodiments, and the principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, the electronic device includes: a processor (processor) 401, a memory (memory) 402, and a bus 403;
wherein, the first and the second end of the pipe are connected with each other,
the processor 401 and the memory 402 complete communication with each other through the bus 403;
the processor 401 is configured to call program instructions in the memory 402 to perform the methods provided by the above-described method embodiments.
The present embodiments disclose a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the methods provided by the above-described method embodiments.
The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the methods provided by the method embodiments described above.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on the understanding, the above technical solutions substantially or otherwise contributing to the prior art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the various embodiments or some parts of the embodiments.
It should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (8)
1. An integrated processing method for a third party security component, comprising:
receiving a mirror image of the virtual security device sent by the third-party security component;
judging whether the virtual security equipment supports log forwarding in a preset format or not;
if the virtual security device supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade; the grades comprise a grade one, a grade two and a grade three;
the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool;
in a corresponding manner, the first and second electrodes are,
if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and integrates the third-party security component into a cloud security resource pool by adopting a third level;
if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two;
and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component into a cloud security resource pool by adopting a first level.
2. The method of claim 1, wherein the configuration interface supports direct individual configuration or batch configuration of the virtual security appliance in a cloud security resource pool.
3. The method of claim 1 or 2, wherein the format of the image of the virtual secure device comprises qcow2, raw, or iso.
4. An integrated processing device of a third-party security component, comprising:
the mirror image receiving module is used for receiving the mirror image of the virtual security device sent by the third-party security component;
the device judging module is used for judging whether the virtual security device supports log forwarding in a preset format;
the component integration module is used for integrating the third-party security component to a cloud security resource pool by adopting a corresponding grade if the virtual security device supports log forwarding in a preset format; the grades comprise a grade one, a grade two and a grade three; the adaptability of the level one to the cloud security resource pool is less than that of the level two to the cloud security resource pool is less than that of the level three to the cloud security resource pool; correspondingly, the component integration module is specifically configured to: if the virtual security device supports log forwarding in a preset format, the third-party security component adopts a single sign-on and license centralized control interface, and the virtual security device provides a configuration interface, and then the third-party security component is integrated into a cloud security resource pool by adopting a third level; if the virtual security device supports log forwarding in a preset format and the third-party security component adopts a single sign-on and license centralized control interface, integrating the third-party security component into a cloud security resource pool by adopting a level two; and if the virtual security equipment supports log forwarding in a preset format, integrating the third-party security component to a cloud security resource pool by adopting a first level.
5. The apparatus of claim 4, wherein the configuration interface supports direct individual or batch configuration of the virtual security appliance in a cloud security resource pool.
6. The apparatus of claim 4 or 5, wherein the format of the image of the virtual security device comprises qcow2, raw, or iso.
7. An electronic device, comprising:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1 to 3.
8. A non-transitory computer-readable storage medium storing a computer program that causes a computer to perform the method according to any one of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811405769.6A CN109756362B (en) | 2018-11-23 | 2018-11-23 | Integrated processing method and device for third-party security component |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811405769.6A CN109756362B (en) | 2018-11-23 | 2018-11-23 | Integrated processing method and device for third-party security component |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109756362A CN109756362A (en) | 2019-05-14 |
CN109756362B true CN109756362B (en) | 2022-11-04 |
Family
ID=66403400
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811405769.6A Active CN109756362B (en) | 2018-11-23 | 2018-11-23 | Integrated processing method and device for third-party security component |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109756362B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114944952B (en) * | 2022-05-20 | 2023-11-07 | 深信服科技股份有限公司 | Data processing method, device, system, equipment and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102176723A (en) * | 2011-03-25 | 2011-09-07 | 北京航空航天大学 | Manufacturing cloud system for supporting on-demand use and dynamic collaboration of manufacturing resources and manufacturing capacities |
CN105991734A (en) * | 2015-02-16 | 2016-10-05 | 广东亿迅科技有限公司 | Cloud platform management method and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104243512B (en) * | 2013-06-07 | 2018-05-04 | 上海联影医疗科技有限公司 | A kind of integrated approach of medical services |
US9871822B2 (en) * | 2014-11-28 | 2018-01-16 | International Business Machines Corporation | Deployment using a context-based cloud security assurance system |
CN106330575A (en) * | 2016-11-08 | 2017-01-11 | 上海有云信息技术有限公司 | Safety service platform and safety service deployment method |
CN107920023B (en) * | 2017-12-29 | 2021-01-19 | 深信服科技股份有限公司 | Method and system for realizing security resource pool |
CN108809963A (en) * | 2018-05-24 | 2018-11-13 | 中国科学院计算机网络信息中心 | Secure resource sharing method, apparatus and storage medium |
-
2018
- 2018-11-23 CN CN201811405769.6A patent/CN109756362B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102176723A (en) * | 2011-03-25 | 2011-09-07 | 北京航空航天大学 | Manufacturing cloud system for supporting on-demand use and dynamic collaboration of manufacturing resources and manufacturing capacities |
CN105991734A (en) * | 2015-02-16 | 2016-10-05 | 广东亿迅科技有限公司 | Cloud platform management method and system |
Also Published As
Publication number | Publication date |
---|---|
CN109756362A (en) | 2019-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3133767B1 (en) | Authorization control method, client and server | |
CN104333863B (en) | Connection management method and device, electronic equipment | |
EP3396905B1 (en) | Method and device for securely sending a message | |
EP3490304B1 (en) | Method for identifying access point and hotspot, and related products | |
CN109495542B (en) | Load distribution method based on performance monitoring and terminal equipment | |
EP3206428A1 (en) | Data traffic management method and device | |
CN106874232B (en) | Charging method, device and terminal of Universal Serial Bus (USB) | |
CN111147425A (en) | Data access processing method, device, equipment and storage medium | |
WO2019047708A1 (en) | Resource configuration method and related product | |
CN106569917A (en) | Data backup method and mobile terminal | |
CN109756362B (en) | Integrated processing method and device for third-party security component | |
US10517077B2 (en) | Method and apparatus for implementing mobile broadband device service | |
CN108540950B (en) | Flow management method and device of double-card terminal and mobile terminal | |
US10045372B2 (en) | Management of the use of a gateway by a plurality of terminals | |
CN105915639B (en) | Page access method and device | |
CN113923130B (en) | Multi-tenant open interface resource configuration method, device and terminal | |
CN112887155B (en) | QoS (quality of service) associated information synchronization method and related product | |
CN114389868A (en) | Method, system and device for distributing cloud resources and storage medium | |
CN105850165B (en) | Terminal application control method, device and system based on near field communication technology | |
CN112417402A (en) | Authority control method, authority control device and storage medium | |
CN112737827A (en) | Resource allocation method, device and system | |
CN112689284B (en) | Wireless network password modification method, device, equipment and storage medium | |
CN106899543B (en) | Content access control method and related equipment | |
US10805167B2 (en) | Accessibility of applications based on network connection type | |
CN115460676B (en) | State management method, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100088 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing Applicant after: Qianxin Technology Group Co.,Ltd. Address before: 100015 Jiuxianqiao Chaoyang District Beijing Road No. 10, building 15, floor 17, layer 1701-26, 3 Applicant before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
CB03 | Change of inventor or designer information |
Inventor after: Bao Kunfu Inventor after: Liu Hao Inventor before: Bao Kunfu |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |