CN110278127B - Agent deployment method and system based on secure transmission protocol - Google Patents
Agent deployment method and system based on secure transmission protocol Download PDFInfo
- Publication number
- CN110278127B CN110278127B CN201910591200.1A CN201910591200A CN110278127B CN 110278127 B CN110278127 B CN 110278127B CN 201910591200 A CN201910591200 A CN 201910591200A CN 110278127 B CN110278127 B CN 110278127B
- Authority
- CN
- China
- Prior art keywords
- agent
- server
- deployment
- module
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/12—Network monitoring probes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Abstract
The invention discloses an Agent deployment method and system based on a secure transmission protocol, wherein in the deployment method, if no Agent is deployed on a server, a public key is automatically generated by the system and is sent to the server together with the Agent when a user deploys the Agent, and the private key is stored in the system; and if the Agent is deployed on the server, the system automatically generates a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server. The deployment system comprises an authority management module, an automatic deployment module, a background audit module and an Agent interaction module. The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
Description
Technical Field
The invention belongs to the technical field of network information security, and particularly relates to an Agent deployment method and system based on a secure transmission protocol.
Background
The information system application process audit is a set of monitoring system which operates independently from the information system when the information system operates, and the system can perform process audit and monitoring on the use behavior of the information system of a user, so that the application process of the information system is ensured to be in line with relevant industry specifications.
The Agent is used as an intelligent software entity, is suitable for a distributed environment, can directly interact with an information system environment, timely acquires multi-level and multi-angle audit information, and can automatically package heterogeneous data. The intelligent agents complete distributed audit analysis tasks through cooperation, and transmission of a large amount of audit data in an application system is effectively reduced. The autonomy of the Agent can autonomously analyze and respond to the event, and the intelligence of the auditing system is improved. The Agent as a distributed object can be dynamically distributed and effectively organized and managed, and the reliability of the distributed audit system is improved. Because the Agent directly runs in the operating system of the server, the obtained related information has higher level, and the Agent must be deployed to ensure the safety of the information. However, in the prior art, when a company staff deploys a file to a server, the company staff needs to continuously send a command to the server.
Disclosure of Invention
The invention discloses an Agent deployment method based on a secure transmission protocol, wherein the Agent is deployed at a server, the server information can be directly obtained, and operation and maintenance personnel do not need to continuously send commands to the server.
The invention also discloses an Agent deployment system based on the safe transmission protocol, the invention realizes safe Agent deployment, realizes the playback of the deployment process, and can be known by multiple parties, when company personnel deploy files to the server, the original process is not monitored by people, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
The Agent is deployed at the server, can directly acquire the information of the server, and does not need operation and maintenance personnel to continuously send commands to the server, and the method needs to ensure that the network condition is good. The Agent and the server are integrated, so that the Agent can directly acquire the information of the server even under the condition that the network connectivity is not good or the network is disconnected, and return the information to the user when the network communication is good.
The method and the system have the advantages that the replay of the deployment process is important, the multiple parties know, the starting point is that when the company personnel deploy files to the server, the original process is not monitored by people, and the monitoring is realized and is transparent. The system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
The invention is mainly realized by the following technical scheme: an Agent deployment method based on a secure transmission protocol is characterized in that before deployment, whether an Agent service is started at a server side is detected, if no Agent is deployed on a server, a public key is automatically generated by a system and is sent to the server together with the Agent when a user deploys the Agent, and the private key is stored in the system; and if the Agent is deployed on the server, the system automatically generates a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server.
In order to better implement the present invention, further, when the same server is authorized to be deployed by a plurality of different users, if one user has deployed Agent at the server, the IP and MAC address of the server where the Agent has been deployed are recorded in the state table; and before deployment, whether the Agent service is started by the server is detected through the state table.
In order to better realize the invention, the Agent encrypts the information of the server through a secure transmission channel and transmits the encrypted information to the system, and the system decrypts the content and transmits the decrypted content to the user through the secure channel between the system and the user, and the content is recorded by a background auditing module in the whole process.
In order to better implement the invention, further, the system adopts a protocol transmission channel to deploy the Agent to the target server.
In order to better implement the invention, further, the deployment action is recorded by the background audit module and an audit file is generated for later viewing.
In order to better realize the invention, further, a system administrator authorizes the Agent deployment and use functions of the server to a common user; or the common user applies for the deployment and use functions to the administrator and waits for the system administrator to approve and obtain the authorization.
The invention is mainly realized by the following technical scheme: an Agent deployment system based on a secure transmission protocol comprises an authority management module, an automatic deployment module, a background audit module and an Agent interaction module, wherein the automatic deployment module comprises a deployment state table and is used for deploying Agent to a server; the Agent interaction module is used for receiving server information returned by the Agent; and the background auditing module is respectively connected with the automatic deployment module and the Agent interaction module.
In order to better implement the present invention, further, the automatic deployment module includes a verification module, a database, a deployment module, and a query module; the verification module is used for verifying whether the host computer deploys the Agent, and the database is used for returning deployment information to the verification module; the deployment module deploys the Agent through a secure transmission protocol, the server installs the Agent and stores a user public key, and opens the Agent service and monitors a secure protocol port; the query module is used for receiving the server information transmitted by the Agent through the security protocol and sending a request to be connected to the server.
The invention has the beneficial effects that:
(1) according to the invention, the Agent is deployed at the server, the server information can be directly obtained, and operation and maintenance personnel do not need to continuously send commands to the server.
(2) The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
(3) The operation and maintenance auditing system ensures that deployment personnel carry out Agent deployment under the authorization permission of an administrator and an auditing administrator by authorizing operation and maintenance personnel and assets, avoids illegal personnel from installing agents to a server in a private way, and ensures that information is not illegally acquired. In addition, for authorized users, the system records all their activities at the server for auditing.
(4) No anyone audits the agent deployment process before and the parties participate in the deployment process, so that the invention ensures the authority and the safety of the deployment. Deploying an agent is a very unsafe thing, namely, the agent can get trojan horse by himself, and the agent can get endless once the supervision is unfavorable; not only is the safety/visibility ensured, but also the use convenience of the whole process is increased; the invention has two common laws on information safety, the more safe the information safety is, the more convenient the information safety is, the more unsafe the information safety is, and the invention also considers the two points.
Drawings
FIG. 1 is a schematic block diagram of the system of the present invention;
FIG. 2 is a functional block diagram of an automated deployment module;
FIG. 3 is a flow chart of the present invention.
Detailed Description
Example 1:
an Agent deployment method based on a secure transmission protocol is characterized in that before deployment, whether an Agent service is started at a server side is detected, if no Agent is deployed on a server, a public key is automatically generated by a system and is sent to the server together with the Agent when a user deploys the Agent, and the private key is stored in the system; and if the Agent is deployed on the server, the system automatically generates a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server. According to the invention, the Agent is deployed at the server, the server information can be directly obtained, and operation and maintenance personnel do not need to continuously send commands to the server.
Example 2:
in this embodiment, optimization is performed on the basis of embodiment 1, and as shown in fig. 3, deployment actions are recorded by a background audit module and an audit file is generated for later viewing. When the same server is authorized to be deployed by a plurality of different users, if one user already deploys the Agent at the server, the IP and MAC address of the server where the Agent is deployed are recorded in the state table; and before deployment, whether the Agent service is started by the server is detected through the state table.
The Agent encrypts the information of the server through a secure transmission channel and then transmits the information to the system, and the system decrypts the content and then transmits the content to the user through the secure channel between the system and the user, and the content is recorded by a background auditing module in the whole process. The system deploys the Agent to the target server using a protocol transport channel. A system administrator authorizes the Agent deployment and use functions of the server to a common user; or the common user applies for the deployment and use functions to the administrator and is authorized after the approval of the system administrator.
The operation and maintenance auditing system ensures that deployment personnel carry out Agent deployment under the authorization permission of an administrator and an auditing administrator by authorizing operation and maintenance personnel and assets, avoids illegal personnel from installing agents to a server in a private way, and ensures that information is not illegally acquired. In addition, for authorized users, the system records all their activities at the server for auditing. No anyone audits the agent deployment process before and the parties participate in the deployment process, so that the invention ensures the authority and the safety of the deployment. Deploying an agent is a very unsafe thing, namely, the agent can get trojan horse by himself, and the agent can get endless once the supervision is unfavorable; not only is the safety/visibility ensured, but also the use convenience of the whole process is increased; the invention has two common laws on information safety, the more safe the information safety is, the more convenient the information safety is, the more unsafe the information safety is, and the invention also considers the two points.
The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
Other parts of this embodiment are the same as embodiment 1, and thus are not described again.
Example 3:
an Agent deployment system based on a secure transmission protocol is disclosed, as shown in fig. 1, and comprises an authority management module, an automatic deployment module, a background audit module and an Agent interaction module, wherein the automatic deployment module comprises a deployment state table and is used for deploying Agent to a server; the Agent interaction module is used for receiving server information returned by the Agent; and the background auditing module is respectively connected with the automatic deployment module and the Agent interaction module.
As shown in fig. 2, the automatic deployment module includes a verification module, a database, a deployment module, and a query module; the verification module is used for verifying whether the host computer deploys the Agent, and the database is used for returning deployment information to the verification module; the deployment module deploys the Agent through a secure transmission protocol, the server installs the Agent and stores a user public key, and opens the Agent service and monitors a secure protocol port; the query module is used for receiving the server information transmitted by the Agent through the security protocol and sending a request to be connected to the server.
The operation and maintenance auditing system ensures that deployment personnel carry out Agent deployment under the authorization permission of an administrator and an auditing administrator by authorizing operation and maintenance personnel and assets, avoids illegal personnel from installing agents to a server in a private way, and ensures that information is not illegally acquired. In addition, for authorized users, the system records all their activities at the server for auditing. No anyone audits the agent deployment process before and the parties participate in the deployment process, so that the invention ensures the authority and the safety of the deployment. Deploying an agent is a very unsafe thing, namely, the agent can get trojan horse by himself, and the agent can get endless once the supervision is unfavorable; not only is the safety/visibility ensured, but also the use convenience of the whole process is increased; the invention has two common laws on information safety, the more safe the information safety is, the more convenient the information safety is, the more unsafe the information safety is, and the invention also considers the two points.
The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
Example 4:
an Agent deployment method based on a secure transmission protocol, as shown in fig. 3, mainly includes the following steps:
before deployment: the administrator can authorize the deployment and use functions of a certain server Agent to a common user, and the user can also apply for the deployment and use functions of the Agent to the administrator and wait for the administrator to approve. The authorization mechanism ensures that the person who has the right to deploy the Agent to the server and use its associated functions is a legitimate person.
In deployment: legal users enable the automatic deployment function in the safe deployment system, and the system background program deploys the Agent to the target server by using a safe protocol transmission channel (such as SSH protocol). When the same server is authorized to be deployed by a plurality of different users, if one user already deploys the Agent at the server, in order to avoid repeated deployment, the state table records the server IP and MAC address of the deployed Agent. Before the next deployment, the server will first go to the state table to inquire whether the Agent service is already opened. The Agent logs in by using a secret key authentication mode, if the Agent is not installed on a certain server, the first user can automatically generate a public key when deploying the secure deployment system and send the public key and the Agent to the server, and the private key is stored in the system; if the server is verified to be deployed with the Agent, the system automatically generates a public and private key pair, the private key is stored in the system, and the public key is automatically sent to the server. The whole deployment action is recorded by the background audit module and a related audit file is generated for future viewing.
After deployment: in order to enhance the security, the Agent on the server waits for the active connection of the security deployment system, so that the personal identity reliability of the remotely connected Agent can be ensured. The Agent encrypts the related information of the server through the previous secure transmission channel and then transmits the encrypted related information back to the secure deployment system, and the secure deployment system decrypts the content and then transmits the decrypted content to the user through the secure channel between the system and the user. This process is also recorded by the background audit system.
1. All the behaviors of the user are performed under the strict identity authentication control of the system, the behaviors of the user must be authorized, the whole action flow is transparent, and after the action is finished, a related audit log is recorded and stored, namely, the security audit can be performed.
2. The system automatically deploys the Agent tool on the designated server and performs corresponding configuration, and does not need manual deployment and installation, namely 'deployment and use'.
The invention realizes safe Agent deployment, realizes playback of the deployment process, and multiple parties know that the original process is not monitored by people when company personnel deploy files to the server, and the invention realizes monitoring and is transparent; the system can audit playback in the process, and solves the problem of potential safety hazard of many companies.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications and equivalent variations of the above embodiments according to the technical spirit of the present invention are included in the scope of the present invention.
Claims (6)
1. The Agent deployment method based on the secure transmission protocol is characterized in that before deployment, whether an Agent service is started at a server side is detected, if no Agent is deployed on a server, a public key is automatically generated by a system and is sent to the server together with the Agent when a user deploys the Agent, and the private key is stored in the system; if the Agent is deployed on the server, the system automatically generates a public and private key pair, wherein the private key is stored in the system, and the public key is sent to the server;
when the same server is authorized to be deployed by a plurality of different users, if one user already deploys the Agent at the server, the IP and MAC address of the server where the Agent is deployed are recorded in the state table; and before deployment, whether the Agent service is started by the server is detected through the state table.
2. The Agent deployment method based on the secure transport protocol according to claim 1, wherein deployment actions are recorded by a background audit module and an audit file is generated for later viewing.
3. The Agent deployment method based on the secure transmission protocol according to claim 1, wherein the Agent encrypts the information of the server through a secure transmission channel and transmits the encrypted information to the system, and the system decrypts the content and records the decrypted content in the whole process of transmitting the decrypted content to the user through the secure channel between the system and the user by the background auditing module.
4. The Agent deployment method based on the secure transmission protocol according to claim 3, wherein the system deploys the Agent to the target server by using a protocol transmission channel.
5. The Agent deployment method based on the secure transport protocol according to any one of claims 1 to 4, characterized in that a system administrator authorizes the Agent deployment and use functions of the server to a general user; or the common user applies for the deployment and use functions to the administrator and is authorized after the approval of the system administrator.
6. An Agent deployment system based on a secure transmission protocol is characterized by comprising an authority management module, an automatic deployment module, a background audit module and an Agent interaction module, wherein the automatic deployment module comprises a deployment state table and is used for deploying Agent to a server; the Agent interaction module is used for receiving server information returned by the Agent; the background auditing module is respectively connected with the automatic deployment module and the Agent interaction module;
the automatic deployment module comprises a verification module, a database, a deployment module and a query module; the verification module is used for verifying whether the host computer deploys the Agent, and the database is used for returning deployment information to the verification module; the deployment module deploys the Agent through a secure transmission protocol, the server installs the Agent and stores a user public key, and opens the Agent service and monitors a secure protocol port; the query module is used for receiving the server information transmitted by the Agent through the security protocol and sending a request to be connected to the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910591200.1A CN110278127B (en) | 2019-07-02 | 2019-07-02 | Agent deployment method and system based on secure transmission protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910591200.1A CN110278127B (en) | 2019-07-02 | 2019-07-02 | Agent deployment method and system based on secure transmission protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278127A CN110278127A (en) | 2019-09-24 |
CN110278127B true CN110278127B (en) | 2020-12-01 |
Family
ID=67963916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910591200.1A Active CN110278127B (en) | 2019-07-02 | 2019-07-02 | Agent deployment method and system based on secure transmission protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278127B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112804291B (en) * | 2020-12-21 | 2022-07-12 | 武汉虹旭信息技术有限责任公司 | Remote equipment auditing method, device and system |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101127454A (en) * | 2006-08-18 | 2008-02-20 | 北京国智恒电力管理科技有限公司 | Power monitoring information security access device |
CN101335746A (en) * | 2007-06-29 | 2008-12-31 | 国际商业机器公司 | Security apparatus, method and system protecting integrity of software system |
CN101355459A (en) * | 2008-08-29 | 2009-01-28 | 北京理工大学 | Method for monitoring network based on credible protocol |
CN101826993A (en) * | 2010-02-04 | 2010-09-08 | 蓝盾信息安全技术股份有限公司 | Method, system and device for monitoring security event |
CN103124293A (en) * | 2012-12-31 | 2013-05-29 | 中国人民解放军理工大学 | Cloud data safe auditing method based on multi-Agent |
CN104270417A (en) * | 2014-09-12 | 2015-01-07 | 湛羽 | Comprehensive service providing system and method based on cloud computing |
CN104935589A (en) * | 2015-06-12 | 2015-09-23 | 浪潮电子信息产业股份有限公司 | Method and system for constructing trusted computing pool and authentication server |
CN105786588A (en) * | 2016-02-22 | 2016-07-20 | 中南大学 | Remote authentication method for cleanroom trusted virtual machine monitor |
CN107122674A (en) * | 2017-04-12 | 2017-09-01 | 成都安恒信息技术有限公司 | A kind of access method of oracle database applied to O&M auditing system |
CN107172001A (en) * | 2016-03-07 | 2017-09-15 | 阿里巴巴集团控股有限公司 | Control method, key proxy server and the web proxy server of web proxy server |
CN107480509A (en) * | 2017-09-22 | 2017-12-15 | 携程旅游网络技术(上海)有限公司 | O&M safety auditing system logs in vessel process, system, equipment and storage medium |
CN107733901A (en) * | 2017-10-23 | 2018-02-23 | 成都安恒信息技术有限公司 | A kind of Windows remote desktops file for O&M auditing system transmits auditing method |
CN109005087A (en) * | 2018-08-30 | 2018-12-14 | 福建星瑞格软件有限公司 | The method that one key tests the Method of Database Secure Audit product packet loss of cross-server installation |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101090330A (en) * | 2006-06-13 | 2007-12-19 | 上海威腾信息科技有限公司 | Network data backup management device and its correlation process method |
CN102571773B (en) * | 2011-12-27 | 2017-04-12 | 浙江省电力公司 | Information security comprehensive audit system and method |
CN104125304B (en) * | 2014-08-13 | 2017-09-19 | 北京华夏威科软件技术有限公司 | A kind of session level application auditing method and system |
CN104135389B (en) * | 2014-08-14 | 2017-11-14 | 北京华电天益信息科技有限公司 | A kind of auditing method of the SSH agreement O&M auditing systems based on agent skill group |
US9871814B2 (en) * | 2015-07-10 | 2018-01-16 | Quest Software Inc. | System and method for improving security intelligence through inventory discovery |
US9965313B2 (en) * | 2016-01-05 | 2018-05-08 | Bitdefender IPR Management Ltd. | Systems and methods for auditing a virtual machine |
CN108833363A (en) * | 2018-05-23 | 2018-11-16 | 文丹 | A kind of block chain right management method and system |
-
2019
- 2019-07-02 CN CN201910591200.1A patent/CN110278127B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101127454A (en) * | 2006-08-18 | 2008-02-20 | 北京国智恒电力管理科技有限公司 | Power monitoring information security access device |
CN101335746A (en) * | 2007-06-29 | 2008-12-31 | 国际商业机器公司 | Security apparatus, method and system protecting integrity of software system |
CN101355459A (en) * | 2008-08-29 | 2009-01-28 | 北京理工大学 | Method for monitoring network based on credible protocol |
CN101826993A (en) * | 2010-02-04 | 2010-09-08 | 蓝盾信息安全技术股份有限公司 | Method, system and device for monitoring security event |
CN103124293A (en) * | 2012-12-31 | 2013-05-29 | 中国人民解放军理工大学 | Cloud data safe auditing method based on multi-Agent |
CN104270417A (en) * | 2014-09-12 | 2015-01-07 | 湛羽 | Comprehensive service providing system and method based on cloud computing |
CN104935589A (en) * | 2015-06-12 | 2015-09-23 | 浪潮电子信息产业股份有限公司 | Method and system for constructing trusted computing pool and authentication server |
CN105786588A (en) * | 2016-02-22 | 2016-07-20 | 中南大学 | Remote authentication method for cleanroom trusted virtual machine monitor |
CN107172001A (en) * | 2016-03-07 | 2017-09-15 | 阿里巴巴集团控股有限公司 | Control method, key proxy server and the web proxy server of web proxy server |
CN107122674A (en) * | 2017-04-12 | 2017-09-01 | 成都安恒信息技术有限公司 | A kind of access method of oracle database applied to O&M auditing system |
CN107480509A (en) * | 2017-09-22 | 2017-12-15 | 携程旅游网络技术(上海)有限公司 | O&M safety auditing system logs in vessel process, system, equipment and storage medium |
CN107733901A (en) * | 2017-10-23 | 2018-02-23 | 成都安恒信息技术有限公司 | A kind of Windows remote desktops file for O&M auditing system transmits auditing method |
CN109005087A (en) * | 2018-08-30 | 2018-12-14 | 福建星瑞格软件有限公司 | The method that one key tests the Method of Database Secure Audit product packet loss of cross-server installation |
Also Published As
Publication number | Publication date |
---|---|
CN110278127A (en) | 2019-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102216322B1 (en) | Secure provisioning and management of devices | |
CN102144193B (en) | Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system | |
CN107483495B (en) | Big data cluster host management method, management system and server | |
CN107122674B (en) | Access method of oracle database applied to operation and maintenance auditing system | |
CN108632250B (en) | Method and equipment for generating command control session master key and transmitting operation command | |
CN112055344B (en) | Engineering machinery Bluetooth equipment identity authentication system and method | |
CN108966216B (en) | Mobile communication method and system applied to power distribution network | |
CN106657011A (en) | Business server authorized secure access method | |
CN104754582A (en) | Client and method for maintaining BYOD (Bring Your Own Device) safety | |
CN104320389A (en) | Fusion identify protection system and fusion identify protection method based on cloud computing | |
CN109088848A (en) | A kind of intelligent network connection automobile information method for security protection | |
CN111815812B (en) | Third-party unlocking control method and system for electronic lock | |
CN109547402B (en) | Data protection method and device, electronic equipment and readable storage medium | |
KR102356474B1 (en) | Systems that support smart work | |
CN110768963B (en) | Trusted security management platform with distributed architecture | |
WO2015169003A1 (en) | Account assignment method and apparatus | |
CN104282060A (en) | Method for unlocking safety intelligent lock system | |
CN107231378A (en) | A kind of security control method based on electric power mobile office equipment, apparatus and system | |
CN111815810A (en) | Safe unlocking method and device for electronic lock | |
CN110278127B (en) | Agent deployment method and system based on secure transmission protocol | |
CN112347440B (en) | User access authority division system of industrial control equipment and application method thereof | |
CN111815815A (en) | Electronic lock safety system | |
CN100590569C (en) | Computer I/O port control program | |
CN111815811B (en) | Electronic lock safety coefficient | |
CN105763518A (en) | B/S architecture-based remote data encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |