CN110636030A - Hierarchical safety management and control method and system for electric power mobile terminal - Google Patents

Hierarchical safety management and control method and system for electric power mobile terminal Download PDF

Info

Publication number
CN110636030A
CN110636030A CN201810645786.0A CN201810645786A CN110636030A CN 110636030 A CN110636030 A CN 110636030A CN 201810645786 A CN201810645786 A CN 201810645786A CN 110636030 A CN110636030 A CN 110636030A
Authority
CN
China
Prior art keywords
security policy
policy
priority
executed
power mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810645786.0A
Other languages
Chinese (zh)
Other versions
CN110636030B (en
Inventor
陈牧
李尼格
戴造建
邵志鹏
李勇
陈璐
方文高
席泽生
张涛
马媛媛
石聪聪
张海峰
原义栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Global Energy Interconnection Research Institute
State Grid Jibei Electric Power Co Ltd
State Grid Liaoning Electric Power Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
National Network Information and Communication Industry Group Co Ltd
Original Assignee
State Grid Corp of China SGCC
Global Energy Interconnection Research Institute
State Grid Jibei Electric Power Co Ltd
State Grid Liaoning Electric Power Co Ltd
Beijing Smartchip Microelectronics Technology Co Ltd
National Network Information and Communication Industry Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Global Energy Interconnection Research Institute, State Grid Jibei Electric Power Co Ltd, State Grid Liaoning Electric Power Co Ltd, Beijing Smartchip Microelectronics Technology Co Ltd, National Network Information and Communication Industry Group Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810645786.0A priority Critical patent/CN110636030B/en
Publication of CN110636030A publication Critical patent/CN110636030A/en
Application granted granted Critical
Publication of CN110636030B publication Critical patent/CN110636030B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a hierarchical safety control method and a hierarchical safety control system for an electric power mobile terminal, wherein the method comprises the following steps: judging whether a security policy received by the power mobile terminal meets the integrity requirement, simultaneously judging whether the security policy conflicts with an executed security policy, and finally selecting the security policy to be executed according to the priority of the security policy and the executed security policy and monitoring the execution state of a feedback policy; before issuing the security policy, generating the security policy by defining the type, violation response action and priority of the policy. The method can be applied to different professional electric mobile operation terminals such as marketing, operation and inspection at present, ensures that the terminals work in compliance according to established safety control strategies, blocks various abnormalities in real time, solves the problem of centralized safety management of the electric mobile operation terminals, and ensures the safe and stable operation of the electric mobile operation terminals.

Description

Hierarchical safety management and control method and system for electric power mobile terminal
Technical Field
The invention relates to the technical field of electric power mobile operation terminal safety control, in particular to a hierarchical safety control method and system for an electric power mobile terminal.
Background
With the development of informatization construction, more and more services related to electric power mobile terminal equipment are involved in the development process of the informatization construction, and the electric power mobile terminal is equipment for creating and storing important and sensitive data of the electric power mobile service and is an important component of an information system, so that the realization of the safety guarantee of the electric power mobile terminal becomes the key for realizing the information security. Currently, the electric mobile terminal faces various security risks, and the security risks are not completely solved, so how to further strengthen the daily operation supervision of the mobile operation terminal becomes a problem that must be solved in order to improve the security of the electric mobile terminal.
In recent years, policy-based security management has become a widely used security solution in mobile terminals, improving scalability and flexibility of management systems. Scalable implementation enables a uniform policy to be applied to a range of related devices and objects; the flexibility is that the operation of the electric power mobile terminal can be dynamically controlled by dynamically modifying the strategy without changing the bottom layer of the electric power mobile terminal and interrupting the normal operation of the electric power mobile terminal. The electric power mobile application is various in types and different in scenes, a single strategy management and control cannot meet the requirement of unified safety management of electric power mobile operation terminals in different service scenes, and if strategies are set for different types of terminals, the strategy management is complicated, and strategy conflict is caused.
Disclosure of Invention
The invention provides a hierarchical security management and control method and a hierarchical security management and control system for an electric mobile terminal, and aims to solve the problem of conflict of security policies in the electric mobile terminal, further improve the flexibility of operation of the electric mobile terminal system and ensure stable operation of the electric mobile terminal system under the management and control of the security policies.
The invention is realized by the following technical scheme:
in a hierarchical security management and control method for a power mobile terminal, the improvement comprising:
step 1: judging whether the security policy received by the electric power mobile terminal meets the integrity requirement, if so, entering the step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy or not, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
and step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Further, before the step 1, the method comprises:
defining a security policy and defining a priority of the security policy according to a hierarchy of the security policy;
and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
Further, the defining the security policy includes:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
Further, the defining the priority of the security policy according to the hierarchy of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
Further, the step 1 includes:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
Further, the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Further, the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
In a hierarchical security management and control system for an electric mobile terminal, the improvement comprising:
a complete judgment module: the system comprises a conflict judging module, a safety policy control module and a safety policy control module, wherein the conflict judging module is used for judging whether the safety policy received by the electric power mobile terminal meets the integrity requirement or not, if so, the conflict judging module is switched to, and if not, the safety policy is deleted;
a conflict judgment module: judging whether the security policy conflicts with the executed security policy or not, if so, turning to a policy selection module, and if not, executing the security policy and the executed security policy;
a policy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Preferably, the system further comprises:
a policy generation module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for defining a security policy and defining the priority of the security policy according to the hierarchy of the security policy; and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
Preferably, the policy generation module is further configured to:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
Preferably, the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
Preferably, the integrity judgment module is configured to:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
Preferably, the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Preferably, the system further comprises a monitoring feedback module for:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
The invention has the beneficial effects that:
according to the technical scheme provided by the invention, the electric power mobile terminal can receive and update the issued security policy in the process of continuing operation by judging whether the security policy meets the integrity requirement or not, judging whether the executed security policy has conflict or not and selecting the security policy to be executed according to the priority, so that the electric power mobile terminal has good stability and real-time performance; meanwhile, the safety strategy is hierarchically controlled, a basis is provided for the electric mobile terminal when the operation safety strategy is selected, and the electric mobile terminal can be hierarchically managed.
Drawings
Fig. 1 is a flowchart of a hierarchical security management and control method for an electric mobile terminal according to the present invention;
FIG. 2 is a schematic structural diagram of a hierarchical security management and control policy model according to the present invention;
fig. 3 is a diagram of a hierarchical security management and control system of an electric mobile terminal according to the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings.
A hierarchical security management method for a power mobile terminal, as shown in fig. 1, the method includes:
step 1: judging whether the security policy received by the electric power mobile terminal meets the integrity requirement, if so, entering the step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy or not, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
and step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Specifically, before the step 1, the method comprises the following steps:
defining a security policy and defining a priority of the security policy according to a hierarchy of the security policy;
and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
For example: the electric mobile terminal is informed in a UDP mode through a send function call Http(s) interface; enabling the electric mobile terminal to call an http(s) interface through a recv function to trigger an OnMessage event to receive the security policy; if the electric mobile operation terminal does not take the message in time, the electric mobile terminal is informed of the coming taking of the message at each heartbeat of the electric mobile terminal so as to ensure that the message is taken by the electric mobile terminal.
Specifically, the defining the security policy includes:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
Specifically, as shown in fig. 2, the defining the priority of the security policy according to the hierarchy of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
Specifically, the step 1 includes:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
Specifically, the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Specifically, the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
For example, the electric mobile terminal strategy configuration execution condition is monitored by monitoring the setting state, the terminal health degree evaluation and the strategy configuration execution condition query. Monitoring a setting state, setting a monitor by the mobile terminal, and immediately re-executing correct policy configuration when monitoring that an execution result of the policy configuration is changed, for example, after the mobile terminal executes a Wifi closing policy, when monitoring that Wifi is converted into an open state, re-executing the Wifi closing policy. And evaluating the health degree of the terminal, and scoring according to the execution condition of the strategy configuration of the mobile terminal, wherein the high score and the low score indicate that the strategy configuration is successfully executed more or less. And inquiring the policy configuration execution condition, listing the execution result of each policy configuration, providing the execution result for a user to inquire, marking the normally executed policy configuration as valid, and marking the policy configuration which is not normally executed as invalid.
A hierarchical security management and control system for an electric mobile terminal, as shown in fig. 3, the system includes:
a complete judgment module: the system comprises a conflict judging module, a safety policy control module and a safety policy control module, wherein the conflict judging module is used for judging whether the safety policy received by the electric power mobile terminal meets the integrity requirement or not, if so, the conflict judging module is switched to, and if not, the safety policy is deleted;
a conflict judgment module: judging whether the security policy conflicts with the executed security policy or not, if so, turning to a policy selection module, and if not, executing the security policy and the executed security policy;
a policy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Specifically, the system further includes:
a policy generation module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for defining a security policy and defining the priority of the security policy according to the hierarchy of the security policy; and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
Specifically, the policy generation module is further configured to:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
Preferably, the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
Specifically, the complete judgment module is configured to:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
Specifically, the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Specifically, the system further comprises a monitoring feedback module, configured to:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (14)

1. A hierarchical safety control method of an electric power mobile terminal is characterized by comprising the following steps:
step 1: judging whether the security policy received by the electric power mobile terminal meets the integrity requirement, if so, entering the step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy or not, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
and step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
2. The method of claim 1, wherein step 1 is preceded by:
defining a security policy and defining a priority of the security policy according to a hierarchy of the security policy;
and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
3. The method of claim 2, wherein the defining a security policy comprises:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
4. The method of claim 2, wherein said defining the priority of the security policy according to the hierarchy of the security policy comprises:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
5. The method of claim 1, wherein step 1, comprises:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
6. The method of claim 1, wherein step 3, comprises:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
7. The method of claim 1, wherein the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
8. The hierarchical safety management and control system of the electric power mobile terminal is characterized by comprising the following components:
a complete judgment module: the system comprises a conflict judging module, a safety policy control module and a safety policy control module, wherein the conflict judging module is used for judging whether the safety policy received by the electric power mobile terminal meets the integrity requirement or not, if so, the conflict judging module is switched to, and if not, the safety policy is deleted;
a conflict judgment module: judging whether the security policy conflicts with the executed security policy or not, if so, turning to a policy selection module, and if not, executing the security policy and the executed security policy;
a policy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
9. The system of claim 8, wherein the system further comprises:
a policy generation module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for defining a security policy and defining the priority of the security policy according to the hierarchy of the security policy; and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
10. The system of claim 9, wherein the policy generation module is further to:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
11. The system of claim 9, wherein the policy generation module is further to:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
12. The system of claim 8, wherein the integrity determination module is to:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
13. The system of claim 8, wherein the policy selection module is to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
14. The system of claim 8, further comprising a monitoring feedback module to:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
CN201810645786.0A 2018-06-21 2018-06-21 Hierarchical security management and control method and system for electric power mobile terminal Active CN110636030B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810645786.0A CN110636030B (en) 2018-06-21 2018-06-21 Hierarchical security management and control method and system for electric power mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810645786.0A CN110636030B (en) 2018-06-21 2018-06-21 Hierarchical security management and control method and system for electric power mobile terminal

Publications (2)

Publication Number Publication Date
CN110636030A true CN110636030A (en) 2019-12-31
CN110636030B CN110636030B (en) 2023-04-21

Family

ID=68966513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810645786.0A Active CN110636030B (en) 2018-06-21 2018-06-21 Hierarchical security management and control method and system for electric power mobile terminal

Country Status (1)

Country Link
CN (1) CN110636030B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859397A (en) * 2020-07-23 2020-10-30 国家工业信息安全发展研究中心 Terminal protection strategy configuration method and device
CN112866264A (en) * 2021-01-25 2021-05-28 深圳融安网络科技有限公司 Network security detection method and device, network security equipment and readable storage medium
CN114205125A (en) * 2021-11-25 2022-03-18 北京国泰网信科技有限公司 Policy management method, device, equipment and medium based on safe area
CN114513419A (en) * 2020-11-16 2022-05-17 北京神州泰岳软件股份有限公司 Security policy configuration method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064341A1 (en) * 2006-03-27 2010-03-11 Carlo Aldera System for Enforcing Security Policies on Mobile Communications Devices
US20110093917A1 (en) * 2008-06-13 2011-04-21 Byron A Alcorn Hierarchical Policy Management
CN102215212A (en) * 2010-04-02 2011-10-12 中兴通讯股份有限公司 Method and architecture for handling conflict of security policies and unified converter
US20130081104A1 (en) * 2011-09-23 2013-03-28 Samsung Sds Co., Ltd. Mobile device management apparatus and method based on security policies and management server for mobile device management
CN103475478A (en) * 2013-09-03 2013-12-25 广东电网公司电力科学研究院 Terminal safety protection method and equipment
EP2792186A1 (en) * 2011-12-14 2014-10-22 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
KR101828845B1 (en) * 2017-04-18 2018-02-14 주식회사 그리드위즈 Policy management method
US20180115470A1 (en) * 2016-10-26 2018-04-26 Arizona Board Of Regents On Behalf Of Arizona State University Security policy analysis framework for distributed software defined networking (sdn) based cloud environments

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064341A1 (en) * 2006-03-27 2010-03-11 Carlo Aldera System for Enforcing Security Policies on Mobile Communications Devices
US20110093917A1 (en) * 2008-06-13 2011-04-21 Byron A Alcorn Hierarchical Policy Management
CN102215212A (en) * 2010-04-02 2011-10-12 中兴通讯股份有限公司 Method and architecture for handling conflict of security policies and unified converter
US20130081104A1 (en) * 2011-09-23 2013-03-28 Samsung Sds Co., Ltd. Mobile device management apparatus and method based on security policies and management server for mobile device management
EP2792186A1 (en) * 2011-12-14 2014-10-22 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
CN103475478A (en) * 2013-09-03 2013-12-25 广东电网公司电力科学研究院 Terminal safety protection method and equipment
US20180115470A1 (en) * 2016-10-26 2018-04-26 Arizona Board Of Regents On Behalf Of Arizona State University Security policy analysis framework for distributed software defined networking (sdn) based cloud environments
KR101828845B1 (en) * 2017-04-18 2018-02-14 주식회사 그리드위즈 Policy management method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
厉颖等: "网络安全管理技术研究", 《软件导刊》 *
周英: "多域网络安全管理系统策略一致性研究与设计", 《四川文理学院学报》 *
唐成华等: "基于特征的网络安全策略验证", 《计算机研究与发展》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859397A (en) * 2020-07-23 2020-10-30 国家工业信息安全发展研究中心 Terminal protection strategy configuration method and device
CN114513419A (en) * 2020-11-16 2022-05-17 北京神州泰岳软件股份有限公司 Security policy configuration method and system
CN112866264A (en) * 2021-01-25 2021-05-28 深圳融安网络科技有限公司 Network security detection method and device, network security equipment and readable storage medium
CN114205125A (en) * 2021-11-25 2022-03-18 北京国泰网信科技有限公司 Policy management method, device, equipment and medium based on safe area
CN114205125B (en) * 2021-11-25 2024-03-29 北京国泰网信科技有限公司 Policy management method, device, equipment and medium based on security area

Also Published As

Publication number Publication date
CN110636030B (en) 2023-04-21

Similar Documents

Publication Publication Date Title
CN110636030A (en) Hierarchical safety management and control method and system for electric power mobile terminal
CN105637814B (en) Be conducive to supervise method, equipment, server and the associated media of online identity
US8856292B2 (en) Managing command compliance in internetworking devices
CN109391613A (en) A kind of intelligent substation method for auditing safely based on SCD parsing
CN104025516A (en) Systems and methods of remote communication
CN104636678B (en) The method and system of management and control is carried out under a kind of cloud computing environment to terminal device
CN110289965B (en) Application program service management method and device
CN108429820A (en) A kind of communication means of internet of things application layer, system and terminal device
CN112929180A (en) Kubernetes zero trust network security system and implementation method thereof
CN101018145A (en) A device and method for remote management
CN113674455A (en) Intelligent door lock remote control method, device, system, equipment and storage medium
CN105592459B (en) Safety certification device based on wireless communication
CN110809262B (en) COAP protocol-based operation and maintenance management method for Internet of things equipment
CN114925391A (en) Method and device for monitoring circulation of private information, electronic equipment and storage medium
CN108388806A (en) A kind of Internet of Things security hardening based on block chain and data Right protection device
CN115001989A (en) Equipment early warning method, device, equipment and readable storage medium
CN108270798B (en) Mobile terminal equipment safety management system
CN116647572B (en) Access endpoint switching method, device, electronic equipment and storage medium
CN111031000B (en) Processing method, device and system of business wind control system and storage medium
CN107911229A (en) Based reminding method, device, electronic equipment and the storage medium that operating status changes
Rysavy et al. A formal authorization framework for networked SCADA systems
CN110111210A (en) A kind of hybrid intelligent social networking system, social contact method and equipment
CN115695165A (en) Automatic operation and maintenance method and system for firewall, electronic equipment and storage medium
CN109361783A (en) The operating method and device of communication equipment in intelligent substation
CN108632114A (en) Standardization for rds data web network equipment configures automatic checking method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant