CN110278127B - Agent deployment method and system based on secure transmission protocol - Google Patents

Agent deployment method and system based on secure transmission protocol Download PDF

Info

Publication number
CN110278127B
CN110278127B CN201910591200.1A CN201910591200A CN110278127B CN 110278127 B CN110278127 B CN 110278127B CN 201910591200 A CN201910591200 A CN 201910591200A CN 110278127 B CN110278127 B CN 110278127B
Authority
CN
China
Prior art keywords
agent
server
deployment
module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910591200.1A
Other languages
Chinese (zh)
Other versions
CN110278127A (en
Inventor
张舒婷
刘韬
范渊
吴永越
郑学新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu DBAPPSecurity Co Ltd
Original Assignee
Chengdu DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu DBAPPSecurity Co Ltd filed Critical Chengdu DBAPPSecurity Co Ltd
Priority to CN201910591200.1A priority Critical patent/CN110278127B/en
Publication of CN110278127A publication Critical patent/CN110278127A/en
Application granted granted Critical
Publication of CN110278127B publication Critical patent/CN110278127B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

The invention discloses an Agent deployment method and system based on a secure transmission protocol, wherein in the deployment method, if no Agent is deployed on a server, a public key is automatically generated by the system and is sent to the server together with the Agent when a user deploys the Agent, and the private key is stored in the system; and if the Agent is deployed on the server, the system automatically generates a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server. The deployment system comprises an authority management module, an automatic deployment module, a background audit module and an Agent interaction module. The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.

Description

Agent deployment method and system based on secure transmission protocol
Technical Field
The invention belongs to the technical field of network information security, and particularly relates to an Agent deployment method and system based on a secure transmission protocol.
Background
The information system application process audit is a set of monitoring system which operates independently from the information system when the information system operates, and the system can perform process audit and monitoring on the use behavior of the information system of a user, so that the application process of the information system is ensured to be in line with relevant industry specifications.
The Agent is used as an intelligent software entity, is suitable for a distributed environment, can directly interact with an information system environment, timely acquires multi-level and multi-angle audit information, and can automatically package heterogeneous data. The intelligent agents complete distributed audit analysis tasks through cooperation, and transmission of a large amount of audit data in an application system is effectively reduced. The autonomy of the Agent can autonomously analyze and respond to the event, and the intelligence of the auditing system is improved. The Agent as a distributed object can be dynamically distributed and effectively organized and managed, and the reliability of the distributed audit system is improved. Because the Agent directly runs in the operating system of the server, the obtained related information has higher level, and the Agent must be deployed to ensure the safety of the information. However, in the prior art, when a company staff deploys a file to a server, the company staff needs to continuously send a command to the server.
Disclosure of Invention
The invention discloses an Agent deployment method based on a secure transmission protocol, wherein the Agent is deployed at a server, the server information can be directly obtained, and operation and maintenance personnel do not need to continuously send commands to the server.
The invention also discloses an Agent deployment system based on the safe transmission protocol, the invention realizes safe Agent deployment, realizes the playback of the deployment process, and can be known by multiple parties, when company personnel deploy files to the server, the original process is not monitored by people, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
The Agent is deployed at the server, can directly acquire the information of the server, and does not need operation and maintenance personnel to continuously send commands to the server, and the method needs to ensure that the network condition is good. The Agent and the server are integrated, so that the Agent can directly acquire the information of the server even under the condition that the network connectivity is not good or the network is disconnected, and return the information to the user when the network communication is good.
The method and the system have the advantages that the replay of the deployment process is important, the multiple parties know, the starting point is that when the company personnel deploy files to the server, the original process is not monitored by people, and the monitoring is realized and is transparent. The system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
The invention is mainly realized by the following technical scheme: an Agent deployment method based on a secure transmission protocol is characterized in that before deployment, whether an Agent service is started at a server side is detected, if no Agent is deployed on a server, a public key is automatically generated by a system and is sent to the server together with the Agent when a user deploys the Agent, and the private key is stored in the system; and if the Agent is deployed on the server, the system automatically generates a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server.
In order to better implement the present invention, further, when the same server is authorized to be deployed by a plurality of different users, if one user has deployed Agent at the server, the IP and MAC address of the server where the Agent has been deployed are recorded in the state table; and before deployment, whether the Agent service is started by the server is detected through the state table.
In order to better realize the invention, the Agent encrypts the information of the server through a secure transmission channel and transmits the encrypted information to the system, and the system decrypts the content and transmits the decrypted content to the user through the secure channel between the system and the user, and the content is recorded by a background auditing module in the whole process.
In order to better implement the invention, further, the system adopts a protocol transmission channel to deploy the Agent to the target server.
In order to better implement the invention, further, the deployment action is recorded by the background audit module and an audit file is generated for later viewing.
In order to better realize the invention, further, a system administrator authorizes the Agent deployment and use functions of the server to a common user; or the common user applies for the deployment and use functions to the administrator and waits for the system administrator to approve and obtain the authorization.
The invention is mainly realized by the following technical scheme: an Agent deployment system based on a secure transmission protocol comprises an authority management module, an automatic deployment module, a background audit module and an Agent interaction module, wherein the automatic deployment module comprises a deployment state table and is used for deploying Agent to a server; the Agent interaction module is used for receiving server information returned by the Agent; and the background auditing module is respectively connected with the automatic deployment module and the Agent interaction module.
In order to better implement the present invention, further, the automatic deployment module includes a verification module, a database, a deployment module, and a query module; the verification module is used for verifying whether the host computer deploys the Agent, and the database is used for returning deployment information to the verification module; the deployment module deploys the Agent through a secure transmission protocol, the server installs the Agent and stores a user public key, and opens the Agent service and monitors a secure protocol port; the query module is used for receiving the server information transmitted by the Agent through the security protocol and sending a request to be connected to the server.
The invention has the beneficial effects that:
(1) according to the invention, the Agent is deployed at the server, the server information can be directly obtained, and operation and maintenance personnel do not need to continuously send commands to the server.
(2) The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
(3) The operation and maintenance auditing system ensures that deployment personnel carry out Agent deployment under the authorization permission of an administrator and an auditing administrator by authorizing operation and maintenance personnel and assets, avoids illegal personnel from installing agents to a server in a private way, and ensures that information is not illegally acquired. In addition, for authorized users, the system records all their activities at the server for auditing.
(4) No anyone audits the agent deployment process before and the parties participate in the deployment process, so that the invention ensures the authority and the safety of the deployment. Deploying an agent is a very unsafe thing, namely, the agent can get trojan horse by himself, and the agent can get endless once the supervision is unfavorable; not only is the safety/visibility ensured, but also the use convenience of the whole process is increased; the invention has two common laws on information safety, the more safe the information safety is, the more convenient the information safety is, the more unsafe the information safety is, and the invention also considers the two points.
Drawings
FIG. 1 is a schematic block diagram of the system of the present invention;
FIG. 2 is a functional block diagram of an automated deployment module;
FIG. 3 is a flow chart of the present invention.
Detailed Description
Example 1:
an Agent deployment method based on a secure transmission protocol is characterized in that before deployment, whether an Agent service is started at a server side is detected, if no Agent is deployed on a server, a public key is automatically generated by a system and is sent to the server together with the Agent when a user deploys the Agent, and the private key is stored in the system; and if the Agent is deployed on the server, the system automatically generates a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server. According to the invention, the Agent is deployed at the server, the server information can be directly obtained, and operation and maintenance personnel do not need to continuously send commands to the server.
Example 2:
in this embodiment, optimization is performed on the basis of embodiment 1, and as shown in fig. 3, deployment actions are recorded by a background audit module and an audit file is generated for later viewing. When the same server is authorized to be deployed by a plurality of different users, if one user already deploys the Agent at the server, the IP and MAC address of the server where the Agent is deployed are recorded in the state table; and before deployment, whether the Agent service is started by the server is detected through the state table.
The Agent encrypts the information of the server through a secure transmission channel and then transmits the information to the system, and the system decrypts the content and then transmits the content to the user through the secure channel between the system and the user, and the content is recorded by a background auditing module in the whole process. The system deploys the Agent to the target server using a protocol transport channel. A system administrator authorizes the Agent deployment and use functions of the server to a common user; or the common user applies for the deployment and use functions to the administrator and is authorized after the approval of the system administrator.
The operation and maintenance auditing system ensures that deployment personnel carry out Agent deployment under the authorization permission of an administrator and an auditing administrator by authorizing operation and maintenance personnel and assets, avoids illegal personnel from installing agents to a server in a private way, and ensures that information is not illegally acquired. In addition, for authorized users, the system records all their activities at the server for auditing. No anyone audits the agent deployment process before and the parties participate in the deployment process, so that the invention ensures the authority and the safety of the deployment. Deploying an agent is a very unsafe thing, namely, the agent can get trojan horse by himself, and the agent can get endless once the supervision is unfavorable; not only is the safety/visibility ensured, but also the use convenience of the whole process is increased; the invention has two common laws on information safety, the more safe the information safety is, the more convenient the information safety is, the more unsafe the information safety is, and the invention also considers the two points.
The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
Other parts of this embodiment are the same as embodiment 1, and thus are not described again.
Example 3:
an Agent deployment system based on a secure transmission protocol is disclosed, as shown in fig. 1, and comprises an authority management module, an automatic deployment module, a background audit module and an Agent interaction module, wherein the automatic deployment module comprises a deployment state table and is used for deploying Agent to a server; the Agent interaction module is used for receiving server information returned by the Agent; and the background auditing module is respectively connected with the automatic deployment module and the Agent interaction module.
As shown in fig. 2, the automatic deployment module includes a verification module, a database, a deployment module, and a query module; the verification module is used for verifying whether the host computer deploys the Agent, and the database is used for returning deployment information to the verification module; the deployment module deploys the Agent through a secure transmission protocol, the server installs the Agent and stores a user public key, and opens the Agent service and monitors a secure protocol port; the query module is used for receiving the server information transmitted by the Agent through the security protocol and sending a request to be connected to the server.
The operation and maintenance auditing system ensures that deployment personnel carry out Agent deployment under the authorization permission of an administrator and an auditing administrator by authorizing operation and maintenance personnel and assets, avoids illegal personnel from installing agents to a server in a private way, and ensures that information is not illegally acquired. In addition, for authorized users, the system records all their activities at the server for auditing. No anyone audits the agent deployment process before and the parties participate in the deployment process, so that the invention ensures the authority and the safety of the deployment. Deploying an agent is a very unsafe thing, namely, the agent can get trojan horse by himself, and the agent can get endless once the supervision is unfavorable; not only is the safety/visibility ensured, but also the use convenience of the whole process is increased; the invention has two common laws on information safety, the more safe the information safety is, the more convenient the information safety is, the more unsafe the information safety is, and the invention also considers the two points.
The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
Example 4:
an Agent deployment method based on a secure transmission protocol, as shown in fig. 3, mainly includes the following steps:
before deployment: the administrator can authorize the deployment and use functions of a certain server Agent to a common user, and the user can also apply for the deployment and use functions of the Agent to the administrator and wait for the administrator to approve. The authorization mechanism ensures that the person who has the right to deploy the Agent to the server and use its associated functions is a legitimate person.
In deployment: legal users enable the automatic deployment function in the safe deployment system, and the system background program deploys the Agent to the target server by using a safe protocol transmission channel (such as SSH protocol). When the same server is authorized to be deployed by a plurality of different users, if one user already deploys the Agent at the server, in order to avoid repeated deployment, the state table records the server IP and MAC address of the deployed Agent. Before the next deployment, the server will first go to the state table to inquire whether the Agent service is already opened. The Agent logs in by using a secret key authentication mode, if the Agent is not installed on a certain server, the first user can automatically generate a public key when deploying the secure deployment system and send the public key and the Agent to the server, and the private key is stored in the system; if the server is verified to be deployed with the Agent, the system automatically generates a public and private key pair, the private key is stored in the system, and the public key is automatically sent to the server. The whole deployment action is recorded by the background audit module and a related audit file is generated for future viewing.
After deployment: in order to enhance the security, the Agent on the server waits for the active connection of the security deployment system, so that the personal identity reliability of the remotely connected Agent can be ensured. The Agent encrypts the related information of the server through the previous secure transmission channel and then transmits the encrypted related information back to the secure deployment system, and the secure deployment system decrypts the content and then transmits the decrypted content to the user through the secure channel between the system and the user. This process is also recorded by the background audit system.
1. All the behaviors of the user are performed under the strict identity authentication control of the system, the behaviors of the user must be authorized, the whole action flow is transparent, and after the action is finished, a related audit log is recorded and stored, namely, the security audit can be performed.
2. The system automatically deploys the Agent tool on the designated server and performs corresponding configuration, and does not need manual deployment and installation, namely 'deployment and use'.
The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications and equivalent variations of the above embodiments according to the technical spirit of the present invention are included in the scope of the present invention.

Claims (6)

1. The Agent deployment method based on the secure transmission protocol is characterized in that before deployment, whether an Agent service is started at a server side is detected, if no Agent is deployed on a server, a public key is automatically generated by a system and is sent to the server together with the Agent when a user deploys the Agent, and the private key is stored in the system; if the Agent is deployed on the server, the system automatically generates a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server;
when the same server is authorized to be deployed by a plurality of different users, if one user already deploys the Agent at the server, the IP and MAC address of the server where the Agent is deployed are recorded in the state table; and before deployment, whether the Agent service is started by the server is detected through the state table.
2. The Agent deployment method based on the secure transport protocol according to claim 1, wherein deployment actions are recorded by a background audit module and an audit file is generated for later viewing.
3. The Agent deployment method based on the secure transmission protocol according to claim 1, wherein the Agent encrypts the information of the server through a secure transmission channel and transmits the encrypted information to the system, and the system decrypts the content and records the decrypted content in the whole process of transmitting the decrypted content to the user through the secure channel between the system and the user by the background auditing module.
4. The Agent deployment method based on the secure transmission protocol according to claim 3, wherein the system deploys the Agent to the target server by using a protocol transmission channel.
5. The Agent deployment method based on the secure transport protocol according to any one of claims 1 to 4, characterized in that a system administrator authorizes the Agent deployment and use functions of the server to a general user; or the common user applies for the deployment and use functions to the administrator and is authorized after the approval of the system administrator.
6. An Agent deployment system based on a secure transmission protocol is characterized by comprising an authority management module, an automatic deployment module, a background audit module and an Agent interaction module, wherein the automatic deployment module comprises a deployment state table and is used for deploying Agent to a server; the Agent interaction module is used for receiving server information returned by the Agent; the background auditing module is respectively connected with the automatic deployment module and the Agent interaction module;
the automatic deployment module comprises a verification module, a database, a deployment module and a query module; the verification module is used for verifying whether the host computer deploys the Agent, and the database is used for returning deployment information to the verification module; the deployment module deploys the Agent through a secure transmission protocol, the server installs the Agent and stores a user public key, and opens the Agent service and monitors a secure protocol port; the query module is used for receiving the server information transmitted by the Agent through the security protocol and sending a request to be connected to the server.
CN201910591200.1A 2019-07-02 2019-07-02 Agent deployment method and system based on secure transmission protocol Active CN110278127B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910591200.1A CN110278127B (en) 2019-07-02 2019-07-02 Agent deployment method and system based on secure transmission protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910591200.1A CN110278127B (en) 2019-07-02 2019-07-02 Agent deployment method and system based on secure transmission protocol

Publications (2)

Publication Number Publication Date
CN110278127A CN110278127A (en) 2019-09-24
CN110278127B true CN110278127B (en) 2020-12-01

Family

ID=67963916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910591200.1A Active CN110278127B (en) 2019-07-02 2019-07-02 Agent deployment method and system based on secure transmission protocol

Country Status (1)

Country Link
CN (1) CN110278127B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804291B (en) * 2020-12-21 2022-07-12 武汉虹旭信息技术有限责任公司 Remote equipment auditing method, device and system

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127454A (en) * 2006-08-18 2008-02-20 北京国智恒电力管理科技有限公司 Power monitoring information security access device
CN101335746A (en) * 2007-06-29 2008-12-31 国际商业机器公司 Security apparatus, method and system protecting integrity of software system
CN101355459A (en) * 2008-08-29 2009-01-28 北京理工大学 Method for monitoring network based on credible protocol
CN101826993A (en) * 2010-02-04 2010-09-08 蓝盾信息安全技术股份有限公司 Method, system and device for monitoring security event
CN103124293A (en) * 2012-12-31 2013-05-29 中国人民解放军理工大学 Cloud data safe auditing method based on multi-Agent
CN104270417A (en) * 2014-09-12 2015-01-07 湛羽 Comprehensive service providing system and method based on cloud computing
CN104935589A (en) * 2015-06-12 2015-09-23 浪潮电子信息产业股份有限公司 Method and system for constructing trusted computing pool and authentication server
CN105786588A (en) * 2016-02-22 2016-07-20 中南大学 Remote authentication method for cleanroom trusted virtual machine monitor
CN107122674A (en) * 2017-04-12 2017-09-01 成都安恒信息技术有限公司 A kind of access method of oracle database applied to O&M auditing system
CN107172001A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 Control method, key proxy server and the web proxy server of web proxy server
CN107480509A (en) * 2017-09-22 2017-12-15 携程旅游网络技术(上海)有限公司 O&M safety auditing system logs in vessel process, system, equipment and storage medium
CN107733901A (en) * 2017-10-23 2018-02-23 成都安恒信息技术有限公司 A kind of Windows remote desktops file for O&M auditing system transmits auditing method
CN109005087A (en) * 2018-08-30 2018-12-14 福建星瑞格软件有限公司 The method that one key tests the Method of Database Secure Audit product packet loss of cross-server installation

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090330A (en) * 2006-06-13 2007-12-19 上海威腾信息科技有限公司 Network data backup management device and its correlation process method
CN102571773B (en) * 2011-12-27 2017-04-12 浙江省电力公司 Information security comprehensive audit system and method
CN104125304B (en) * 2014-08-13 2017-09-19 北京华夏威科软件技术有限公司 A kind of session level application auditing method and system
CN104135389B (en) * 2014-08-14 2017-11-14 北京华电天益信息科技有限公司 A kind of auditing method of the SSH agreement O&M auditing systems based on agent skill group
US9871814B2 (en) * 2015-07-10 2018-01-16 Quest Software Inc. System and method for improving security intelligence through inventory discovery
US9965313B2 (en) * 2016-01-05 2018-05-08 Bitdefender IPR Management Ltd. Systems and methods for auditing a virtual machine
CN108833363A (en) * 2018-05-23 2018-11-16 文丹 A kind of block chain right management method and system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127454A (en) * 2006-08-18 2008-02-20 北京国智恒电力管理科技有限公司 Power monitoring information security access device
CN101335746A (en) * 2007-06-29 2008-12-31 国际商业机器公司 Security apparatus, method and system protecting integrity of software system
CN101355459A (en) * 2008-08-29 2009-01-28 北京理工大学 Method for monitoring network based on credible protocol
CN101826993A (en) * 2010-02-04 2010-09-08 蓝盾信息安全技术股份有限公司 Method, system and device for monitoring security event
CN103124293A (en) * 2012-12-31 2013-05-29 中国人民解放军理工大学 Cloud data safe auditing method based on multi-Agent
CN104270417A (en) * 2014-09-12 2015-01-07 湛羽 Comprehensive service providing system and method based on cloud computing
CN104935589A (en) * 2015-06-12 2015-09-23 浪潮电子信息产业股份有限公司 Method and system for constructing trusted computing pool and authentication server
CN105786588A (en) * 2016-02-22 2016-07-20 中南大学 Remote authentication method for cleanroom trusted virtual machine monitor
CN107172001A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 Control method, key proxy server and the web proxy server of web proxy server
CN107122674A (en) * 2017-04-12 2017-09-01 成都安恒信息技术有限公司 A kind of access method of oracle database applied to O&M auditing system
CN107480509A (en) * 2017-09-22 2017-12-15 携程旅游网络技术(上海)有限公司 O&M safety auditing system logs in vessel process, system, equipment and storage medium
CN107733901A (en) * 2017-10-23 2018-02-23 成都安恒信息技术有限公司 A kind of Windows remote desktops file for O&M auditing system transmits auditing method
CN109005087A (en) * 2018-08-30 2018-12-14 福建星瑞格软件有限公司 The method that one key tests the Method of Database Secure Audit product packet loss of cross-server installation

Also Published As

Publication number Publication date
CN110278127A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
KR102216322B1 (en) Secure provisioning and management of devices
CN102144193B (en) Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system
CN107483495B (en) Big data cluster host management method, management system and server
CN107122674B (en) Access method of oracle database applied to operation and maintenance auditing system
CN108632250B (en) Method and equipment for generating command control session master key and transmitting operation command
CN112055344B (en) Engineering machinery Bluetooth equipment identity authentication system and method
CN108966216B (en) Mobile communication method and system applied to power distribution network
CN106657011A (en) Business server authorized secure access method
CN104754582A (en) Client and method for maintaining BYOD (Bring Your Own Device) safety
CN104320389A (en) Fusion identify protection system and fusion identify protection method based on cloud computing
CN109088848A (en) A kind of intelligent network connection automobile information method for security protection
CN111815812B (en) Third-party unlocking control method and system for electronic lock
CN109547402B (en) Data protection method and device, electronic equipment and readable storage medium
KR102356474B1 (en) Systems that support smart work
CN110768963B (en) Trusted security management platform with distributed architecture
WO2015169003A1 (en) Account assignment method and apparatus
CN104282060A (en) Method for unlocking safety intelligent lock system
CN107231378A (en) A kind of security control method based on electric power mobile office equipment, apparatus and system
CN111815810A (en) Safe unlocking method and device for electronic lock
CN110278127B (en) Agent deployment method and system based on secure transmission protocol
CN112347440B (en) User access authority division system of industrial control equipment and application method thereof
CN111815815A (en) Electronic lock safety system
CN100590569C (en) Computer I/O port control program
CN111815811B (en) Electronic lock safety coefficient
CN105763518A (en) B/S architecture-based remote data encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant