CN110278127A - A kind of Agent dispositions method and system based on secure transfer protocol - Google Patents

A kind of Agent dispositions method and system based on secure transfer protocol Download PDF

Info

Publication number
CN110278127A
CN110278127A CN201910591200.1A CN201910591200A CN110278127A CN 110278127 A CN110278127 A CN 110278127A CN 201910591200 A CN201910591200 A CN 201910591200A CN 110278127 A CN110278127 A CN 110278127A
Authority
CN
China
Prior art keywords
agent
deployment
server
module
transfer protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910591200.1A
Other languages
Chinese (zh)
Other versions
CN110278127B (en
Inventor
张舒婷
刘韬
范渊
吴永越
郑学新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu DBAPPSecurity Co Ltd
Original Assignee
Chengdu DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu DBAPPSecurity Co Ltd filed Critical Chengdu DBAPPSecurity Co Ltd
Priority to CN201910591200.1A priority Critical patent/CN110278127B/en
Publication of CN110278127A publication Critical patent/CN110278127A/en
Application granted granted Critical
Publication of CN110278127B publication Critical patent/CN110278127B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

The invention discloses a kind of Agent dispositions method and system based on secure transfer protocol, if without deployment Agent on server in the dispositions method, when then user disposes Agent, system automatically generated public key is simultaneously sent collectively to server with Agent, and private key is saved to system;If deployed Agent on server, system automatically generated public private key pair, wherein private key is saved to system, and public key is sent to server.The deployment system includes authority management module, automatic deployment module, backstage Audit Module, Agent interactive module.The present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, and when associate is to server disposition file, originally this process is nobody's monitoring, and the present invention realizes monitoring and transparent;This system of this process can audit playback, solve security hidden trouble existing for many companies.

Description

A kind of Agent dispositions method and system based on secure transfer protocol
Technical field
The invention belongs to the technical fields of the network information security, and in particular to a kind of Agent based on secure transfer protocol Dispositions method and system.
Background technique
Information system application process audit is in information system operation, independently of a set of supervision system of information system operation System, the system can information system usage behavior to user carry out process audit and monitoring, guarantee applying for information system Cheng Fuhe relevant industries specification.
Agent is suitble to distributed environment as intelligentized software entity, can occur directly to hand over information system environment Mutually, the audit information of stage construction, multi-angle is obtained in due course, and isomeric data can be packaged automatically.Multiple intelligent Agents Distributed audit analysis task is completed by cooperating, and effectively reduces the transmission of a large amount of Audit datas in application system.Agent Autonomy can automatically event be analyzed and be responded, improve the intelligence of auditing system.Agent is as distributed right As that DYNAMIC DISTRIBUTION and organization and management can be effectively performed, the reliability of distributed audit system is increased.Since Agent is direct It is run in the operating system of server end, the relevant information rank got is higher, for the safety for guaranteeing information, it is necessary to right Agent is disposed.However, associate needs constantly to send when to server disposition file in existing technology It orders to server-side.
Summary of the invention
The invention discloses a kind of Agent dispositions method based on secure transfer protocol, is deployed in server-side for Agent, Service client information can be directly acquired, constantly sends a command to server-side without operation maintenance personnel.
The invention also discloses a kind of Agent deployment system based on secure transfer protocol, the present invention realize Ministry of State Security Agent is affixed one's name to, playing back for deployment process is realized, knows in many ways, when associate is to server disposition file, originally This process be nobody monitoring, the present invention realize monitoring and it is transparent;This system of this process can audit playback, Solves security hidden trouble existing for many companies.
Agent is deployed in server-side, can directly acquire service client information, and clothes are constantly sent a command to without operation maintenance personnel Business end, this method need to guarantee that Network status is good.It ensure that since agency is integrated with server even if in network company Under the general character is bad or offline condition, Agent can also directly acquire service client information, and information is returned again to when network link is good To user.
Emphasis is that playing back for deployment process, knows in many ways, and starting point is exactly in associate to server disposition When file, originally this process be nobody monitoring, the present invention realize monitoring and it is transparent.This process this be System can audit playback, solve security hidden trouble existing for many companies.
The present invention is achieved through the following technical solutions: a kind of Agent dispositions method based on secure transfer protocol, Before deployment, whether detection service end opens Agent service, if without deployment Agent on server, when user disposes Agent, System automatically generated public key is simultaneously sent collectively to server with Agent, and private key is saved to system;If deployed on server Agent, then system automatically generated public private key pair, wherein private key is saved to system, and public key is sent to server.
In order to preferably realize the present invention, further, multiple and different the Ministry of Revenue is used when identical server is granted to When administration, if a user deploys Agent in server-side, recorded in state table disposed the server ip of Agent with And MAC Address;Whether Agent service is opened by state table detection service end before deployment.
In order to preferably realize the present invention, further, Agent is encrypted the information of server by secure transmission channel After reach system, and system content is decrypted after in the whole process for being transmitted to user by the safe lane between system and user It is recorded by the Audit Module on backstage.
In order to preferably realize the present invention, further, Agent is deployed to target clothes using protocol transmission channel by system Business device.
In order to preferably realize the present invention, further, deployment movement is recorded by backstage Audit Module and generates audit text Part is for checking in the future.
In order to preferably realize the present invention, further, the Agent of server is disposed and is used function by system manager License to ordinary user;Or ordinary user to administrator's Request For Disposition and use function, and waiting system administrator examination & approval and It is authorized.
The present invention is achieved through the following technical solutions: a kind of Agent deployment system based on secure transfer protocol, packet Authority management module, automatic deployment module, backstage Audit Module, Agent interactive module are included, the automatic deployment module includes portion State table is affixed one's name to, and automatic deployment module is used to Agent being deployed to server;The Agent interactive module is for receiving Agent The server info of passback;The backstage Audit Module is connect with automatic deployment module, Agent interactive module respectively.
In order to preferably realize the present invention, further, the automatic deployment module includes authentication module, database, portion Affix one's name to module, enquiry module;The authentication module is for verifying whether host disposes Agent, and database is for returning deployment information Deployment information is returned to authentication module;The deployment module disposes Agent by secure transfer protocol, and server installs Agent simultaneously Client public key is stored, and opens Agent and services and monitor security protocol port;The enquiry module passes through for receiving Agent Security protocol transmission server information, and server is connected to for sending request.
Beneficial effects of the present invention:
(1) Agent is deployed in server-side by the present invention, can be directly acquired service client information, constantly be sent without operation maintenance personnel It orders to server-side.
(2) present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, in company man When member is to server disposition file, originally this process is nobody's monitoring, and the present invention, which realizes, to be monitored and transparent; This system of this process can audit playback, solve security hidden trouble existing for many companies.
(3) O&M auditing system of the invention is by the authorization to operation maintenance personnel and assets, ensure that deployment personnel be Administrator, audit administrator authorization under carry out Agent and map out the work, avoid unauthorized person privately installation agent to taking It is engaged in end, guaranteeing that information is not illegally accessed.In addition to this, for the user authorized, system records it in all of server-side Behavior is for audit.
(4) nobody audit agent disposes process before, and participates in knowing in many ways, this invention ensures that deployment Authoritative and safety.Disposing agent itself is a very unsafe thing, is equivalent to and oneself gives oneself upper wooden horse, one Denier supervision is unfavorable to have endless trouble;It not only ensure that safety/viewability now, and increase the easy-to-use of whole flow process Property;Have a universal law in information security, it is more safer more inconvenient, it is more more convenient more dangerous, the present invention combined this two Point.
Detailed description of the invention
Fig. 1 is system principle diagram of the invention;
Fig. 2 is the functional block diagram of automatic deployment module;
Fig. 3 is flow chart of the invention.
Specific embodiment
Embodiment 1:
A kind of Agent dispositions method based on secure transfer protocol, before deployment, whether detection service end opens Agent service, If when user disposes Agent, system automatically generated public key is simultaneously sent collectively to Agent without deployment Agent on server Server, private key are saved to system;If deployed Agent on server, system automatically generated public private key pair, wherein private key It saves to system, public key is sent to server.Agent is deployed in server-side by the present invention, can directly acquire server-side letter Breath, constantly sends a command to server-side without operation maintenance personnel.
Embodiment 2:
The present embodiment is to optimize on the basis of embodiment 1, as shown in figure 3, deployment movement is recorded by backstage Audit Module And audit document is generated for checking in the future.When identical server is granted to multiple and different user's deployment, if one User deploys Agent in server-side, then the server ip and MAC Address for having disposed Agent are recorded in state table;? Whether Agent service is opened by state table detection service end before deployment.
After Agent reaches system after encrypting the information of server by secure transmission channel, and system decrypts content It is recorded in the whole process for being transmitted to user by the safe lane between system and user by the Audit Module on backstage.System uses Agent is deployed to destination server by protocol transmission channel.System manager is awarded by the Agent deployment of server and using function It weighs to ordinary user;Or ordinary user to administrator's Request For Disposition and uses function, and examines and obtain by system manager To authorization.
O&M auditing system of the invention ensure that deployment personnel are to manage by the authorization to operation maintenance personnel and assets Member, audit administrator authorization under carry out Agent and map out the work, avoid unauthorized person privately installation agent to servicing End guarantees that information is not illegally accessed.In addition to this, for the user authorized, system records it in all rows of server-side For for audit.The agent of nobody audit before disposes process, and participates in knowing in many ways, this invention ensures that deployment Authoritative and safety.Disposing agent itself is a very unsafe thing, is equivalent to and oneself gives oneself upper wooden horse, one Denier supervision is unfavorable to have endless trouble;It not only ensure that safety/viewability now, and increase the easy-to-use of whole flow process Property;Have a universal law in information security, it is more safer more inconvenient, it is more more convenient more dangerous, the present invention combined this two Point.
The present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, in associate When to server disposition file, originally this process is nobody's monitoring, and the present invention realizes monitoring and transparent;This This system of a process can audit playback, solve security hidden trouble existing for many companies.
The other parts of the present embodiment are same as Example 1, and so it will not be repeated.
Embodiment 3:
A kind of Agent deployment system based on secure transfer protocol, as shown in Figure 1, including authority management module, automatic deployment mould Block, backstage Audit Module, Agent interactive module, the automatic deployment module includes deployable state table, and automatic deployment module is used In Agent is deployed to server;The Agent interactive module is used to receive the server info of Agent passback;The backstage Audit Module is connect with automatic deployment module, Agent interactive module respectively.
As shown in Fig. 2, the automatic deployment module includes authentication module, database, deployment module, enquiry module;It is described For verifying whether host disposes Agent, database is used to deployment information returning to deployment information to authentication module authentication module; The deployment module disposes Agent by secure transfer protocol, and server installation Agent simultaneously stores client public key, and opens Agent is serviced and is monitored security protocol port;The enquiry module is believed for receiving Agent by security protocol transmission server Breath, and server is connected to for sending request.
O&M auditing system of the invention ensure that deployment personnel are to manage by the authorization to operation maintenance personnel and assets Member, audit administrator authorization under carry out Agent and map out the work, avoid unauthorized person privately installation agent to servicing End guarantees that information is not illegally accessed.In addition to this, for the user authorized, system records it in all rows of server-side For for audit.The agent of nobody audit before disposes process, and participates in knowing in many ways, this invention ensures that deployment Authoritative and safety.Disposing agent itself is a very unsafe thing, is equivalent to and oneself gives oneself upper wooden horse, one Denier supervision is unfavorable to have endless trouble;It not only ensure that safety/viewability now, and increase the easy-to-use of whole flow process Property;Have a universal law in information security, it is more safer more inconvenient, it is more more convenient more dangerous, the present invention combined this two Point.
The present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, in associate When to server disposition file, originally this process is nobody's monitoring, and the present invention realizes monitoring and transparent;This This system of a process can audit playback, solve security hidden trouble existing for many companies.
Embodiment 4:
A kind of Agent dispositions method based on secure transfer protocol, as shown in figure 3, mainly comprising the steps that
Before deployment: administrator can license to ordinary user by certain server A gent deployment and using function, and user can also be with Apply for Agent deployment to administrator and use function, and administrator is waited to examine.Licensing scheme guarantee, which has the right to dispose Agent, arrives It is competent person on server and using the personnel of its correlation function.
In deployment: legitimate user enables the automatic deployment function in security deployment system, and system background program utilizes safety Protocol transmission channel (such as: SSH agreement) Agent is deployed to destination server.When identical server be granted to it is more When a different user disposes, if a user deploys Agent in server-side, to avoid repeating disposing, in state table Record has disposed the server ip and MAC Address of Agent.Next time deployment before can first go in state table to inquire the server-side be It is no to have been switched on Agent service.Agent is logged in using key authentication mode, if not installation Agent on certain server, the One user security deployment system in deployment can automatically generate public key and be sent collectively to server with Agent, and private key saves To system;If verifying certain server deployed Agent, one public private key pair of system automatically generated, private key is saved to system, public Key is automatically sent to server.Entire deployment movement is recorded by backstage Audit Module and generates related audit document for day After check.
After deployment: in order to enhance safety, the Agent on server waits the active connection of security deployment system, so It can guarantee the personal part reliability for remotely connecting Agent.Agent pass through before secure transmission channel, by the phase of server It is back to security deployment system after closing information encryption, security deployment system passes through between system and user again after decrypting content Safe lane is transmitted to user.The process is also recorded by backstage auditing system.
1. all behaviors of user are carried out under the stringent authentication control of the system, the behavior of user must be awarded Power, entire motion flow be it is transparent, movement terminate after there is relevant audit log to carry out record preservation, i.e., " can examine safely Meter ".
2. Agent tool is deployed on specified server by the system automatically, and carries out corresponding configuration, user is not needed Manually dispose installation, i.e. " deployment and use ".
The present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, in associate When to server disposition file, originally this process is nobody's monitoring, and the present invention realizes monitoring and transparent;This This system of a process can audit playback, solve security hidden trouble existing for many companies.
The above is only presently preferred embodiments of the present invention, not does limitation in any form to the present invention, it is all according to According to technical spirit any simple modification to the above embodiments of the invention, equivalent variations, protection of the invention is each fallen within Within the scope of.

Claims (8)

1. a kind of Agent dispositions method based on secure transfer protocol, which is characterized in that before deployment, whether detection service end Open Agent service, if on server without deployment Agent, user dispose Agent when, system automatically generated public key and with Agent is sent collectively to server, and private key is saved to system;If deployed Agent, system automatically generated are public on server Private key pair, wherein private key is saved to system, and public key is sent to server.
2. a kind of Agent dispositions method based on secure transfer protocol according to claim 1, which is characterized in that deployment Movement is recorded by backstage Audit Module and generates audit document for checking in the future.
3. a kind of Agent dispositions method based on secure transfer protocol according to claim 1, which is characterized in that work as phase When same server is granted to multiple and different user's deployment, if a user deploys Agent, shape in server-side The server ip and MAC Address for having disposed Agent are recorded in state table;Whether opened before deployment by state table detection service end Open Agent service.
4. a kind of Agent dispositions method based on secure transfer protocol according to claim 3, which is characterized in that Agent By secure transmission channel will server information encrypt after reach system, and system content is decrypted after by system and using The whole process that safe lane between family is transmitted to user is recorded by the Audit Module on backstage.
5. a kind of Agent dispositions method based on secure transfer protocol according to claim 4, which is characterized in that system Agent is deployed to by destination server using protocol transmission channel.
6. a kind of Agent dispositions method based on secure transfer protocol according to claim 1-5, feature exist In system manager licenses to ordinary user by the Agent deployment of server and using function;Or ordinary user is to administrator Request For Disposition and use function, and by system manager examination & approval and it is authorized.
7. a kind of Agent deployment system based on secure transfer protocol, which is characterized in that including authority management module, automatic portion Module, backstage Audit Module, Agent interactive module are affixed one's name to, the automatic deployment module includes deployable state table, and automatic deployment mould Block is used to Agent being deployed to server;The Agent interactive module is used to receive the server info of Agent passback;It is described Backstage Audit Module is connect with automatic deployment module, Agent interactive module respectively.
8. a kind of Agent deployment system based on secure transfer protocol according to claim 7, which is characterized in that described Automatic deployment module includes authentication module, database, deployment module, enquiry module;The authentication module is used to verify host No deployment Agent, database are used to deployment information returning to deployment information to authentication module;The deployment module is passed by safety Defeated agreement disposes Agent, and server installation Agent simultaneously stores client public key, and opens Agent and service and monitor security protocol end Mouthful;The enquiry module is connected to clothes for receiving Agent by security protocol transmission server information, and for sending request Business device.
CN201910591200.1A 2019-07-02 2019-07-02 Agent deployment method and system based on secure transmission protocol Active CN110278127B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910591200.1A CN110278127B (en) 2019-07-02 2019-07-02 Agent deployment method and system based on secure transmission protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910591200.1A CN110278127B (en) 2019-07-02 2019-07-02 Agent deployment method and system based on secure transmission protocol

Publications (2)

Publication Number Publication Date
CN110278127A true CN110278127A (en) 2019-09-24
CN110278127B CN110278127B (en) 2020-12-01

Family

ID=67963916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910591200.1A Active CN110278127B (en) 2019-07-02 2019-07-02 Agent deployment method and system based on secure transmission protocol

Country Status (1)

Country Link
CN (1) CN110278127B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804291A (en) * 2020-12-21 2021-05-14 武汉虹旭信息技术有限责任公司 Remote equipment auditing method, device and system

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090330A (en) * 2006-06-13 2007-12-19 上海威腾信息科技有限公司 Network data backup management device and its correlation process method
CN101127454A (en) * 2006-08-18 2008-02-20 北京国智恒电力管理科技有限公司 Power monitoring information security access device
CN101335746A (en) * 2007-06-29 2008-12-31 国际商业机器公司 Security apparatus, method and system protecting integrity of software system
CN101355459A (en) * 2008-08-29 2009-01-28 北京理工大学 Method for monitoring network based on credible protocol
CN101826993A (en) * 2010-02-04 2010-09-08 蓝盾信息安全技术股份有限公司 Method, system and device for monitoring security event
CN102571773A (en) * 2011-12-27 2012-07-11 浙江省电力公司 Information security comprehensive audit system and method
CN103124293A (en) * 2012-12-31 2013-05-29 中国人民解放军理工大学 Cloud data safe auditing method based on multi-Agent
CN104125304A (en) * 2014-08-13 2014-10-29 北京华夏威科软件技术有限公司 Session-level application auditing method and system
CN104135389A (en) * 2014-08-14 2014-11-05 华北电力大学句容研究中心 SSH protocol operation and maintenance auditing system and method based on proxy technology
CN104270417A (en) * 2014-09-12 2015-01-07 湛羽 Comprehensive service providing system and method based on cloud computing
CN104935589A (en) * 2015-06-12 2015-09-23 浪潮电子信息产业股份有限公司 Method and system for constructing trusted computing pool and authentication server
CN105786588A (en) * 2016-02-22 2016-07-20 中南大学 Remote authentication method for cleanroom trusted virtual machine monitor
US20170013007A1 (en) * 2015-07-10 2017-01-12 Dell Products L.P. System and method for improving security intelligence through inventory discovery
CN107122674A (en) * 2017-04-12 2017-09-01 成都安恒信息技术有限公司 A kind of access method of oracle database applied to O&M auditing system
CN107172001A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 Control method, key proxy server and the web proxy server of web proxy server
CN107480509A (en) * 2017-09-22 2017-12-15 携程旅游网络技术(上海)有限公司 O&M safety auditing system logs in vessel process, system, equipment and storage medium
CN107733901A (en) * 2017-10-23 2018-02-23 成都安恒信息技术有限公司 A kind of Windows remote desktops file for O&M auditing system transmits auditing method
US20180253329A1 (en) * 2016-01-05 2018-09-06 Bitdefender IPR Management Ltd. Systems and Methods for Auditing a Virtual Machine
CN108833363A (en) * 2018-05-23 2018-11-16 文丹 A kind of block chain right management method and system
CN109005087A (en) * 2018-08-30 2018-12-14 福建星瑞格软件有限公司 The method that one key tests the Method of Database Secure Audit product packet loss of cross-server installation

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090330A (en) * 2006-06-13 2007-12-19 上海威腾信息科技有限公司 Network data backup management device and its correlation process method
CN101127454A (en) * 2006-08-18 2008-02-20 北京国智恒电力管理科技有限公司 Power monitoring information security access device
CN101335746A (en) * 2007-06-29 2008-12-31 国际商业机器公司 Security apparatus, method and system protecting integrity of software system
CN101355459A (en) * 2008-08-29 2009-01-28 北京理工大学 Method for monitoring network based on credible protocol
CN101826993A (en) * 2010-02-04 2010-09-08 蓝盾信息安全技术股份有限公司 Method, system and device for monitoring security event
CN102571773A (en) * 2011-12-27 2012-07-11 浙江省电力公司 Information security comprehensive audit system and method
CN103124293A (en) * 2012-12-31 2013-05-29 中国人民解放军理工大学 Cloud data safe auditing method based on multi-Agent
CN104125304A (en) * 2014-08-13 2014-10-29 北京华夏威科软件技术有限公司 Session-level application auditing method and system
CN104135389A (en) * 2014-08-14 2014-11-05 华北电力大学句容研究中心 SSH protocol operation and maintenance auditing system and method based on proxy technology
CN104270417A (en) * 2014-09-12 2015-01-07 湛羽 Comprehensive service providing system and method based on cloud computing
CN104935589A (en) * 2015-06-12 2015-09-23 浪潮电子信息产业股份有限公司 Method and system for constructing trusted computing pool and authentication server
US20170013007A1 (en) * 2015-07-10 2017-01-12 Dell Products L.P. System and method for improving security intelligence through inventory discovery
US20180253329A1 (en) * 2016-01-05 2018-09-06 Bitdefender IPR Management Ltd. Systems and Methods for Auditing a Virtual Machine
CN105786588A (en) * 2016-02-22 2016-07-20 中南大学 Remote authentication method for cleanroom trusted virtual machine monitor
CN107172001A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 Control method, key proxy server and the web proxy server of web proxy server
CN107122674A (en) * 2017-04-12 2017-09-01 成都安恒信息技术有限公司 A kind of access method of oracle database applied to O&M auditing system
CN107480509A (en) * 2017-09-22 2017-12-15 携程旅游网络技术(上海)有限公司 O&M safety auditing system logs in vessel process, system, equipment and storage medium
CN107733901A (en) * 2017-10-23 2018-02-23 成都安恒信息技术有限公司 A kind of Windows remote desktops file for O&M auditing system transmits auditing method
CN108833363A (en) * 2018-05-23 2018-11-16 文丹 A kind of block chain right management method and system
CN109005087A (en) * 2018-08-30 2018-12-14 福建星瑞格软件有限公司 The method that one key tests the Method of Database Secure Audit product packet loss of cross-server installation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘行: "基于协议代理的安全内控运维审计系统设计与实现", 《中国优秀硕士学位论文全文数据库工程科技Ⅱ辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804291A (en) * 2020-12-21 2021-05-14 武汉虹旭信息技术有限责任公司 Remote equipment auditing method, device and system

Also Published As

Publication number Publication date
CN110278127B (en) 2020-12-01

Similar Documents

Publication Publication Date Title
US5530758A (en) Operational methods for a secure node in a computer network
CN103297437B (en) A kind of method of mobile intelligent terminal secure access service device
CN105103488B (en) By the policy Enforcement of associated data
CN105027493B (en) Safety moving application connection bus
CN102685093B (en) A kind of identity authorization system based on mobile terminal and method
CN106888084B (en) Quantum fort machine system and authentication method thereof
CN106453384B (en) Secure cloud disk system and secure encryption method thereof
US7590844B1 (en) Decryption system and method for network analyzers and security programs
CN201194396Y (en) Safe gateway platform based on transparent proxy gateway
CN106657011A (en) Business server authorized secure access method
CN103108028A (en) Cloud computing processing system with security architecture
CN103413100B (en) File security protection system
CN103973715B (en) Cloud computing security system and method
JPH07325785A (en) Network user identifying method, ciphering communication method, application client and server
CN103220141A (en) Sensitive data protecting method and system based on group key strategy
EP3185465A1 (en) A method for encrypting data and a method for decrypting data
CN104219077A (en) Information management system for middle and small-sized enterprises
CN112861157A (en) Data sharing method based on decentralized identity and proxy re-encryption
CN106101160A (en) A kind of system login method and device
CN102025748B (en) Method, device and system for acquiring user name of Kerberos authentication mode
CN108966216A (en) A kind of method of mobile communication and device applied to power distribution network
CN107196976B (en) Audit gateway based on video protocol and method and system thereof
CN107231378A (en) A kind of security control method based on electric power mobile office equipment, apparatus and system
CN103310159A (en) Method and system for safely taking out electronic file with mobile intelligent terminal
CN107257344B (en) Server access method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant