CN110278127A - A kind of Agent dispositions method and system based on secure transfer protocol - Google Patents
A kind of Agent dispositions method and system based on secure transfer protocol Download PDFInfo
- Publication number
- CN110278127A CN110278127A CN201910591200.1A CN201910591200A CN110278127A CN 110278127 A CN110278127 A CN 110278127A CN 201910591200 A CN201910591200 A CN 201910591200A CN 110278127 A CN110278127 A CN 110278127A
- Authority
- CN
- China
- Prior art keywords
- agent
- deployment
- server
- module
- transfer protocol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/12—Network monitoring probes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Abstract
The invention discloses a kind of Agent dispositions method and system based on secure transfer protocol, if without deployment Agent on server in the dispositions method, when then user disposes Agent, system automatically generated public key is simultaneously sent collectively to server with Agent, and private key is saved to system;If deployed Agent on server, system automatically generated public private key pair, wherein private key is saved to system, and public key is sent to server.The deployment system includes authority management module, automatic deployment module, backstage Audit Module, Agent interactive module.The present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, and when associate is to server disposition file, originally this process is nobody's monitoring, and the present invention realizes monitoring and transparent;This system of this process can audit playback, solve security hidden trouble existing for many companies.
Description
Technical field
The invention belongs to the technical fields of the network information security, and in particular to a kind of Agent based on secure transfer protocol
Dispositions method and system.
Background technique
Information system application process audit is in information system operation, independently of a set of supervision system of information system operation
System, the system can information system usage behavior to user carry out process audit and monitoring, guarantee applying for information system
Cheng Fuhe relevant industries specification.
Agent is suitble to distributed environment as intelligentized software entity, can occur directly to hand over information system environment
Mutually, the audit information of stage construction, multi-angle is obtained in due course, and isomeric data can be packaged automatically.Multiple intelligent Agents
Distributed audit analysis task is completed by cooperating, and effectively reduces the transmission of a large amount of Audit datas in application system.Agent
Autonomy can automatically event be analyzed and be responded, improve the intelligence of auditing system.Agent is as distributed right
As that DYNAMIC DISTRIBUTION and organization and management can be effectively performed, the reliability of distributed audit system is increased.Since Agent is direct
It is run in the operating system of server end, the relevant information rank got is higher, for the safety for guaranteeing information, it is necessary to right
Agent is disposed.However, associate needs constantly to send when to server disposition file in existing technology
It orders to server-side.
Summary of the invention
The invention discloses a kind of Agent dispositions method based on secure transfer protocol, is deployed in server-side for Agent,
Service client information can be directly acquired, constantly sends a command to server-side without operation maintenance personnel.
The invention also discloses a kind of Agent deployment system based on secure transfer protocol, the present invention realize Ministry of State Security
Agent is affixed one's name to, playing back for deployment process is realized, knows in many ways, when associate is to server disposition file, originally
This process be nobody monitoring, the present invention realize monitoring and it is transparent;This system of this process can audit playback,
Solves security hidden trouble existing for many companies.
Agent is deployed in server-side, can directly acquire service client information, and clothes are constantly sent a command to without operation maintenance personnel
Business end, this method need to guarantee that Network status is good.It ensure that since agency is integrated with server even if in network company
Under the general character is bad or offline condition, Agent can also directly acquire service client information, and information is returned again to when network link is good
To user.
Emphasis is that playing back for deployment process, knows in many ways, and starting point is exactly in associate to server disposition
When file, originally this process be nobody monitoring, the present invention realize monitoring and it is transparent.This process this be
System can audit playback, solve security hidden trouble existing for many companies.
The present invention is achieved through the following technical solutions: a kind of Agent dispositions method based on secure transfer protocol,
Before deployment, whether detection service end opens Agent service, if without deployment Agent on server, when user disposes Agent,
System automatically generated public key is simultaneously sent collectively to server with Agent, and private key is saved to system;If deployed on server
Agent, then system automatically generated public private key pair, wherein private key is saved to system, and public key is sent to server.
In order to preferably realize the present invention, further, multiple and different the Ministry of Revenue is used when identical server is granted to
When administration, if a user deploys Agent in server-side, recorded in state table disposed the server ip of Agent with
And MAC Address;Whether Agent service is opened by state table detection service end before deployment.
In order to preferably realize the present invention, further, Agent is encrypted the information of server by secure transmission channel
After reach system, and system content is decrypted after in the whole process for being transmitted to user by the safe lane between system and user
It is recorded by the Audit Module on backstage.
In order to preferably realize the present invention, further, Agent is deployed to target clothes using protocol transmission channel by system
Business device.
In order to preferably realize the present invention, further, deployment movement is recorded by backstage Audit Module and generates audit text
Part is for checking in the future.
In order to preferably realize the present invention, further, the Agent of server is disposed and is used function by system manager
License to ordinary user;Or ordinary user to administrator's Request For Disposition and use function, and waiting system administrator examination & approval and
It is authorized.
The present invention is achieved through the following technical solutions: a kind of Agent deployment system based on secure transfer protocol, packet
Authority management module, automatic deployment module, backstage Audit Module, Agent interactive module are included, the automatic deployment module includes portion
State table is affixed one's name to, and automatic deployment module is used to Agent being deployed to server;The Agent interactive module is for receiving Agent
The server info of passback;The backstage Audit Module is connect with automatic deployment module, Agent interactive module respectively.
In order to preferably realize the present invention, further, the automatic deployment module includes authentication module, database, portion
Affix one's name to module, enquiry module;The authentication module is for verifying whether host disposes Agent, and database is for returning deployment information
Deployment information is returned to authentication module;The deployment module disposes Agent by secure transfer protocol, and server installs Agent simultaneously
Client public key is stored, and opens Agent and services and monitor security protocol port;The enquiry module passes through for receiving Agent
Security protocol transmission server information, and server is connected to for sending request.
Beneficial effects of the present invention:
(1) Agent is deployed in server-side by the present invention, can be directly acquired service client information, constantly be sent without operation maintenance personnel
It orders to server-side.
(2) present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, in company man
When member is to server disposition file, originally this process is nobody's monitoring, and the present invention, which realizes, to be monitored and transparent;
This system of this process can audit playback, solve security hidden trouble existing for many companies.
(3) O&M auditing system of the invention is by the authorization to operation maintenance personnel and assets, ensure that deployment personnel be
Administrator, audit administrator authorization under carry out Agent and map out the work, avoid unauthorized person privately installation agent to taking
It is engaged in end, guaranteeing that information is not illegally accessed.In addition to this, for the user authorized, system records it in all of server-side
Behavior is for audit.
(4) nobody audit agent disposes process before, and participates in knowing in many ways, this invention ensures that deployment
Authoritative and safety.Disposing agent itself is a very unsafe thing, is equivalent to and oneself gives oneself upper wooden horse, one
Denier supervision is unfavorable to have endless trouble;It not only ensure that safety/viewability now, and increase the easy-to-use of whole flow process
Property;Have a universal law in information security, it is more safer more inconvenient, it is more more convenient more dangerous, the present invention combined this two
Point.
Detailed description of the invention
Fig. 1 is system principle diagram of the invention;
Fig. 2 is the functional block diagram of automatic deployment module;
Fig. 3 is flow chart of the invention.
Specific embodiment
Embodiment 1:
A kind of Agent dispositions method based on secure transfer protocol, before deployment, whether detection service end opens Agent service,
If when user disposes Agent, system automatically generated public key is simultaneously sent collectively to Agent without deployment Agent on server
Server, private key are saved to system;If deployed Agent on server, system automatically generated public private key pair, wherein private key
It saves to system, public key is sent to server.Agent is deployed in server-side by the present invention, can directly acquire server-side letter
Breath, constantly sends a command to server-side without operation maintenance personnel.
Embodiment 2:
The present embodiment is to optimize on the basis of embodiment 1, as shown in figure 3, deployment movement is recorded by backstage Audit Module
And audit document is generated for checking in the future.When identical server is granted to multiple and different user's deployment, if one
User deploys Agent in server-side, then the server ip and MAC Address for having disposed Agent are recorded in state table;?
Whether Agent service is opened by state table detection service end before deployment.
After Agent reaches system after encrypting the information of server by secure transmission channel, and system decrypts content
It is recorded in the whole process for being transmitted to user by the safe lane between system and user by the Audit Module on backstage.System uses
Agent is deployed to destination server by protocol transmission channel.System manager is awarded by the Agent deployment of server and using function
It weighs to ordinary user;Or ordinary user to administrator's Request For Disposition and uses function, and examines and obtain by system manager
To authorization.
O&M auditing system of the invention ensure that deployment personnel are to manage by the authorization to operation maintenance personnel and assets
Member, audit administrator authorization under carry out Agent and map out the work, avoid unauthorized person privately installation agent to servicing
End guarantees that information is not illegally accessed.In addition to this, for the user authorized, system records it in all rows of server-side
For for audit.The agent of nobody audit before disposes process, and participates in knowing in many ways, this invention ensures that deployment
Authoritative and safety.Disposing agent itself is a very unsafe thing, is equivalent to and oneself gives oneself upper wooden horse, one
Denier supervision is unfavorable to have endless trouble;It not only ensure that safety/viewability now, and increase the easy-to-use of whole flow process
Property;Have a universal law in information security, it is more safer more inconvenient, it is more more convenient more dangerous, the present invention combined this two
Point.
The present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, in associate
When to server disposition file, originally this process is nobody's monitoring, and the present invention realizes monitoring and transparent;This
This system of a process can audit playback, solve security hidden trouble existing for many companies.
The other parts of the present embodiment are same as Example 1, and so it will not be repeated.
Embodiment 3:
A kind of Agent deployment system based on secure transfer protocol, as shown in Figure 1, including authority management module, automatic deployment mould
Block, backstage Audit Module, Agent interactive module, the automatic deployment module includes deployable state table, and automatic deployment module is used
In Agent is deployed to server;The Agent interactive module is used to receive the server info of Agent passback;The backstage
Audit Module is connect with automatic deployment module, Agent interactive module respectively.
As shown in Fig. 2, the automatic deployment module includes authentication module, database, deployment module, enquiry module;It is described
For verifying whether host disposes Agent, database is used to deployment information returning to deployment information to authentication module authentication module;
The deployment module disposes Agent by secure transfer protocol, and server installation Agent simultaneously stores client public key, and opens
Agent is serviced and is monitored security protocol port;The enquiry module is believed for receiving Agent by security protocol transmission server
Breath, and server is connected to for sending request.
O&M auditing system of the invention ensure that deployment personnel are to manage by the authorization to operation maintenance personnel and assets
Member, audit administrator authorization under carry out Agent and map out the work, avoid unauthorized person privately installation agent to servicing
End guarantees that information is not illegally accessed.In addition to this, for the user authorized, system records it in all rows of server-side
For for audit.The agent of nobody audit before disposes process, and participates in knowing in many ways, this invention ensures that deployment
Authoritative and safety.Disposing agent itself is a very unsafe thing, is equivalent to and oneself gives oneself upper wooden horse, one
Denier supervision is unfavorable to have endless trouble;It not only ensure that safety/viewability now, and increase the easy-to-use of whole flow process
Property;Have a universal law in information security, it is more safer more inconvenient, it is more more convenient more dangerous, the present invention combined this two
Point.
The present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, in associate
When to server disposition file, originally this process is nobody's monitoring, and the present invention realizes monitoring and transparent;This
This system of a process can audit playback, solve security hidden trouble existing for many companies.
Embodiment 4:
A kind of Agent dispositions method based on secure transfer protocol, as shown in figure 3, mainly comprising the steps that
Before deployment: administrator can license to ordinary user by certain server A gent deployment and using function, and user can also be with
Apply for Agent deployment to administrator and use function, and administrator is waited to examine.Licensing scheme guarantee, which has the right to dispose Agent, arrives
It is competent person on server and using the personnel of its correlation function.
In deployment: legitimate user enables the automatic deployment function in security deployment system, and system background program utilizes safety
Protocol transmission channel (such as: SSH agreement) Agent is deployed to destination server.When identical server be granted to it is more
When a different user disposes, if a user deploys Agent in server-side, to avoid repeating disposing, in state table
Record has disposed the server ip and MAC Address of Agent.Next time deployment before can first go in state table to inquire the server-side be
It is no to have been switched on Agent service.Agent is logged in using key authentication mode, if not installation Agent on certain server, the
One user security deployment system in deployment can automatically generate public key and be sent collectively to server with Agent, and private key saves
To system;If verifying certain server deployed Agent, one public private key pair of system automatically generated, private key is saved to system, public
Key is automatically sent to server.Entire deployment movement is recorded by backstage Audit Module and generates related audit document for day
After check.
After deployment: in order to enhance safety, the Agent on server waits the active connection of security deployment system, so
It can guarantee the personal part reliability for remotely connecting Agent.Agent pass through before secure transmission channel, by the phase of server
It is back to security deployment system after closing information encryption, security deployment system passes through between system and user again after decrypting content
Safe lane is transmitted to user.The process is also recorded by backstage auditing system.
1. all behaviors of user are carried out under the stringent authentication control of the system, the behavior of user must be awarded
Power, entire motion flow be it is transparent, movement terminate after there is relevant audit log to carry out record preservation, i.e., " can examine safely
Meter ".
2. Agent tool is deployed on specified server by the system automatically, and carries out corresponding configuration, user is not needed
Manually dispose installation, i.e. " deployment and use ".
The present invention realizes security deployment Agent, realizes playing back for deployment process, knows in many ways, in associate
When to server disposition file, originally this process is nobody's monitoring, and the present invention realizes monitoring and transparent;This
This system of a process can audit playback, solve security hidden trouble existing for many companies.
The above is only presently preferred embodiments of the present invention, not does limitation in any form to the present invention, it is all according to
According to technical spirit any simple modification to the above embodiments of the invention, equivalent variations, protection of the invention is each fallen within
Within the scope of.
Claims (8)
1. a kind of Agent dispositions method based on secure transfer protocol, which is characterized in that before deployment, whether detection service end
Open Agent service, if on server without deployment Agent, user dispose Agent when, system automatically generated public key and with
Agent is sent collectively to server, and private key is saved to system;If deployed Agent, system automatically generated are public on server
Private key pair, wherein private key is saved to system, and public key is sent to server.
2. a kind of Agent dispositions method based on secure transfer protocol according to claim 1, which is characterized in that deployment
Movement is recorded by backstage Audit Module and generates audit document for checking in the future.
3. a kind of Agent dispositions method based on secure transfer protocol according to claim 1, which is characterized in that work as phase
When same server is granted to multiple and different user's deployment, if a user deploys Agent, shape in server-side
The server ip and MAC Address for having disposed Agent are recorded in state table;Whether opened before deployment by state table detection service end
Open Agent service.
4. a kind of Agent dispositions method based on secure transfer protocol according to claim 3, which is characterized in that Agent
By secure transmission channel will server information encrypt after reach system, and system content is decrypted after by system and using
The whole process that safe lane between family is transmitted to user is recorded by the Audit Module on backstage.
5. a kind of Agent dispositions method based on secure transfer protocol according to claim 4, which is characterized in that system
Agent is deployed to by destination server using protocol transmission channel.
6. a kind of Agent dispositions method based on secure transfer protocol according to claim 1-5, feature exist
In system manager licenses to ordinary user by the Agent deployment of server and using function;Or ordinary user is to administrator
Request For Disposition and use function, and by system manager examination & approval and it is authorized.
7. a kind of Agent deployment system based on secure transfer protocol, which is characterized in that including authority management module, automatic portion
Module, backstage Audit Module, Agent interactive module are affixed one's name to, the automatic deployment module includes deployable state table, and automatic deployment mould
Block is used to Agent being deployed to server;The Agent interactive module is used to receive the server info of Agent passback;It is described
Backstage Audit Module is connect with automatic deployment module, Agent interactive module respectively.
8. a kind of Agent deployment system based on secure transfer protocol according to claim 7, which is characterized in that described
Automatic deployment module includes authentication module, database, deployment module, enquiry module;The authentication module is used to verify host
No deployment Agent, database are used to deployment information returning to deployment information to authentication module;The deployment module is passed by safety
Defeated agreement disposes Agent, and server installation Agent simultaneously stores client public key, and opens Agent and service and monitor security protocol end
Mouthful;The enquiry module is connected to clothes for receiving Agent by security protocol transmission server information, and for sending request
Business device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910591200.1A CN110278127B (en) | 2019-07-02 | 2019-07-02 | Agent deployment method and system based on secure transmission protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910591200.1A CN110278127B (en) | 2019-07-02 | 2019-07-02 | Agent deployment method and system based on secure transmission protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278127A true CN110278127A (en) | 2019-09-24 |
CN110278127B CN110278127B (en) | 2020-12-01 |
Family
ID=67963916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910591200.1A Active CN110278127B (en) | 2019-07-02 | 2019-07-02 | Agent deployment method and system based on secure transmission protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278127B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112804291A (en) * | 2020-12-21 | 2021-05-14 | 武汉虹旭信息技术有限责任公司 | Remote equipment auditing method, device and system |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101090330A (en) * | 2006-06-13 | 2007-12-19 | 上海威腾信息科技有限公司 | Network data backup management device and its correlation process method |
CN101127454A (en) * | 2006-08-18 | 2008-02-20 | 北京国智恒电力管理科技有限公司 | Power monitoring information security access device |
CN101335746A (en) * | 2007-06-29 | 2008-12-31 | 国际商业机器公司 | Security apparatus, method and system protecting integrity of software system |
CN101355459A (en) * | 2008-08-29 | 2009-01-28 | 北京理工大学 | Method for monitoring network based on credible protocol |
CN101826993A (en) * | 2010-02-04 | 2010-09-08 | 蓝盾信息安全技术股份有限公司 | Method, system and device for monitoring security event |
CN102571773A (en) * | 2011-12-27 | 2012-07-11 | 浙江省电力公司 | Information security comprehensive audit system and method |
CN103124293A (en) * | 2012-12-31 | 2013-05-29 | 中国人民解放军理工大学 | Cloud data safe auditing method based on multi-Agent |
CN104125304A (en) * | 2014-08-13 | 2014-10-29 | 北京华夏威科软件技术有限公司 | Session-level application auditing method and system |
CN104135389A (en) * | 2014-08-14 | 2014-11-05 | 华北电力大学句容研究中心 | SSH protocol operation and maintenance auditing system and method based on proxy technology |
CN104270417A (en) * | 2014-09-12 | 2015-01-07 | 湛羽 | Comprehensive service providing system and method based on cloud computing |
CN104935589A (en) * | 2015-06-12 | 2015-09-23 | 浪潮电子信息产业股份有限公司 | Method and system for constructing trusted computing pool and authentication server |
CN105786588A (en) * | 2016-02-22 | 2016-07-20 | 中南大学 | Remote authentication method for cleanroom trusted virtual machine monitor |
US20170013007A1 (en) * | 2015-07-10 | 2017-01-12 | Dell Products L.P. | System and method for improving security intelligence through inventory discovery |
CN107122674A (en) * | 2017-04-12 | 2017-09-01 | 成都安恒信息技术有限公司 | A kind of access method of oracle database applied to O&M auditing system |
CN107172001A (en) * | 2016-03-07 | 2017-09-15 | 阿里巴巴集团控股有限公司 | Control method, key proxy server and the web proxy server of web proxy server |
CN107480509A (en) * | 2017-09-22 | 2017-12-15 | 携程旅游网络技术(上海)有限公司 | O&M safety auditing system logs in vessel process, system, equipment and storage medium |
CN107733901A (en) * | 2017-10-23 | 2018-02-23 | 成都安恒信息技术有限公司 | A kind of Windows remote desktops file for O&M auditing system transmits auditing method |
US20180253329A1 (en) * | 2016-01-05 | 2018-09-06 | Bitdefender IPR Management Ltd. | Systems and Methods for Auditing a Virtual Machine |
CN108833363A (en) * | 2018-05-23 | 2018-11-16 | 文丹 | A kind of block chain right management method and system |
CN109005087A (en) * | 2018-08-30 | 2018-12-14 | 福建星瑞格软件有限公司 | The method that one key tests the Method of Database Secure Audit product packet loss of cross-server installation |
-
2019
- 2019-07-02 CN CN201910591200.1A patent/CN110278127B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101090330A (en) * | 2006-06-13 | 2007-12-19 | 上海威腾信息科技有限公司 | Network data backup management device and its correlation process method |
CN101127454A (en) * | 2006-08-18 | 2008-02-20 | 北京国智恒电力管理科技有限公司 | Power monitoring information security access device |
CN101335746A (en) * | 2007-06-29 | 2008-12-31 | 国际商业机器公司 | Security apparatus, method and system protecting integrity of software system |
CN101355459A (en) * | 2008-08-29 | 2009-01-28 | 北京理工大学 | Method for monitoring network based on credible protocol |
CN101826993A (en) * | 2010-02-04 | 2010-09-08 | 蓝盾信息安全技术股份有限公司 | Method, system and device for monitoring security event |
CN102571773A (en) * | 2011-12-27 | 2012-07-11 | 浙江省电力公司 | Information security comprehensive audit system and method |
CN103124293A (en) * | 2012-12-31 | 2013-05-29 | 中国人民解放军理工大学 | Cloud data safe auditing method based on multi-Agent |
CN104125304A (en) * | 2014-08-13 | 2014-10-29 | 北京华夏威科软件技术有限公司 | Session-level application auditing method and system |
CN104135389A (en) * | 2014-08-14 | 2014-11-05 | 华北电力大学句容研究中心 | SSH protocol operation and maintenance auditing system and method based on proxy technology |
CN104270417A (en) * | 2014-09-12 | 2015-01-07 | 湛羽 | Comprehensive service providing system and method based on cloud computing |
CN104935589A (en) * | 2015-06-12 | 2015-09-23 | 浪潮电子信息产业股份有限公司 | Method and system for constructing trusted computing pool and authentication server |
US20170013007A1 (en) * | 2015-07-10 | 2017-01-12 | Dell Products L.P. | System and method for improving security intelligence through inventory discovery |
US20180253329A1 (en) * | 2016-01-05 | 2018-09-06 | Bitdefender IPR Management Ltd. | Systems and Methods for Auditing a Virtual Machine |
CN105786588A (en) * | 2016-02-22 | 2016-07-20 | 中南大学 | Remote authentication method for cleanroom trusted virtual machine monitor |
CN107172001A (en) * | 2016-03-07 | 2017-09-15 | 阿里巴巴集团控股有限公司 | Control method, key proxy server and the web proxy server of web proxy server |
CN107122674A (en) * | 2017-04-12 | 2017-09-01 | 成都安恒信息技术有限公司 | A kind of access method of oracle database applied to O&M auditing system |
CN107480509A (en) * | 2017-09-22 | 2017-12-15 | 携程旅游网络技术(上海)有限公司 | O&M safety auditing system logs in vessel process, system, equipment and storage medium |
CN107733901A (en) * | 2017-10-23 | 2018-02-23 | 成都安恒信息技术有限公司 | A kind of Windows remote desktops file for O&M auditing system transmits auditing method |
CN108833363A (en) * | 2018-05-23 | 2018-11-16 | 文丹 | A kind of block chain right management method and system |
CN109005087A (en) * | 2018-08-30 | 2018-12-14 | 福建星瑞格软件有限公司 | The method that one key tests the Method of Database Secure Audit product packet loss of cross-server installation |
Non-Patent Citations (1)
Title |
---|
刘行: "基于协议代理的安全内控运维审计系统设计与实现", 《中国优秀硕士学位论文全文数据库工程科技Ⅱ辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112804291A (en) * | 2020-12-21 | 2021-05-14 | 武汉虹旭信息技术有限责任公司 | Remote equipment auditing method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN110278127B (en) | 2020-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5530758A (en) | Operational methods for a secure node in a computer network | |
CN103297437B (en) | A kind of method of mobile intelligent terminal secure access service device | |
CN105103488B (en) | By the policy Enforcement of associated data | |
CN105027493B (en) | Safety moving application connection bus | |
CN102685093B (en) | A kind of identity authorization system based on mobile terminal and method | |
CN106888084B (en) | Quantum fort machine system and authentication method thereof | |
CN106453384B (en) | Secure cloud disk system and secure encryption method thereof | |
US7590844B1 (en) | Decryption system and method for network analyzers and security programs | |
CN201194396Y (en) | Safe gateway platform based on transparent proxy gateway | |
CN106657011A (en) | Business server authorized secure access method | |
CN103108028A (en) | Cloud computing processing system with security architecture | |
CN103413100B (en) | File security protection system | |
CN103973715B (en) | Cloud computing security system and method | |
JPH07325785A (en) | Network user identifying method, ciphering communication method, application client and server | |
CN103220141A (en) | Sensitive data protecting method and system based on group key strategy | |
EP3185465A1 (en) | A method for encrypting data and a method for decrypting data | |
CN104219077A (en) | Information management system for middle and small-sized enterprises | |
CN112861157A (en) | Data sharing method based on decentralized identity and proxy re-encryption | |
CN106101160A (en) | A kind of system login method and device | |
CN102025748B (en) | Method, device and system for acquiring user name of Kerberos authentication mode | |
CN108966216A (en) | A kind of method of mobile communication and device applied to power distribution network | |
CN107196976B (en) | Audit gateway based on video protocol and method and system thereof | |
CN107231378A (en) | A kind of security control method based on electric power mobile office equipment, apparatus and system | |
CN103310159A (en) | Method and system for safely taking out electronic file with mobile intelligent terminal | |
CN107257344B (en) | Server access method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |