CN110636030A - Hierarchical safety management and control method and system for electric power mobile terminal - Google Patents
Hierarchical safety management and control method and system for electric power mobile terminal Download PDFInfo
- Publication number
- CN110636030A CN110636030A CN201810645786.0A CN201810645786A CN110636030A CN 110636030 A CN110636030 A CN 110636030A CN 201810645786 A CN201810645786 A CN 201810645786A CN 110636030 A CN110636030 A CN 110636030A
- Authority
- CN
- China
- Prior art keywords
- security policy
- policy
- priority
- executed
- power mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a hierarchical safety control method and a hierarchical safety control system for an electric power mobile terminal, wherein the method comprises the following steps: judging whether a security policy received by the power mobile terminal meets the integrity requirement, simultaneously judging whether the security policy conflicts with an executed security policy, and finally selecting the security policy to be executed according to the priority of the security policy and the executed security policy and monitoring the execution state of a feedback policy; before issuing the security policy, generating the security policy by defining the type, violation response action and priority of the policy. The method can be applied to different professional electric mobile operation terminals such as marketing, operation and inspection at present, ensures that the terminals work in compliance according to established safety control strategies, blocks various abnormalities in real time, solves the problem of centralized safety management of the electric mobile operation terminals, and ensures the safe and stable operation of the electric mobile operation terminals.
Description
Technical Field
The invention relates to the technical field of electric power mobile operation terminal safety control, in particular to a hierarchical safety control method and system for an electric power mobile terminal.
Background
With the development of informatization construction, more and more services related to electric power mobile terminal equipment are involved in the development process of the informatization construction, and the electric power mobile terminal is equipment for creating and storing important and sensitive data of the electric power mobile service and is an important component of an information system, so that the realization of the safety guarantee of the electric power mobile terminal becomes the key for realizing the information security. Currently, the electric mobile terminal faces various security risks, and the security risks are not completely solved, so how to further strengthen the daily operation supervision of the mobile operation terminal becomes a problem that must be solved in order to improve the security of the electric mobile terminal.
In recent years, policy-based security management has become a widely used security solution in mobile terminals, improving scalability and flexibility of management systems. Scalable implementation enables a uniform policy to be applied to a range of related devices and objects; the flexibility is that the operation of the electric power mobile terminal can be dynamically controlled by dynamically modifying the strategy without changing the bottom layer of the electric power mobile terminal and interrupting the normal operation of the electric power mobile terminal. The electric power mobile application is various in types and different in scenes, a single strategy management and control cannot meet the requirement of unified safety management of electric power mobile operation terminals in different service scenes, and if strategies are set for different types of terminals, the strategy management is complicated, and strategy conflict is caused.
Disclosure of Invention
The invention provides a hierarchical security management and control method and a hierarchical security management and control system for an electric mobile terminal, and aims to solve the problem of conflict of security policies in the electric mobile terminal, further improve the flexibility of operation of the electric mobile terminal system and ensure stable operation of the electric mobile terminal system under the management and control of the security policies.
The invention is realized by the following technical scheme:
in a hierarchical security management and control method for a power mobile terminal, the improvement comprising:
step 1: judging whether the security policy received by the electric power mobile terminal meets the integrity requirement, if so, entering the step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy or not, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
and step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Further, before the step 1, the method comprises:
defining a security policy and defining a priority of the security policy according to a hierarchy of the security policy;
and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
Further, the defining the security policy includes:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
Further, the defining the priority of the security policy according to the hierarchy of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
Further, the step 1 includes:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
Further, the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Further, the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
In a hierarchical security management and control system for an electric mobile terminal, the improvement comprising:
a complete judgment module: the system comprises a conflict judging module, a safety policy control module and a safety policy control module, wherein the conflict judging module is used for judging whether the safety policy received by the electric power mobile terminal meets the integrity requirement or not, if so, the conflict judging module is switched to, and if not, the safety policy is deleted;
a conflict judgment module: judging whether the security policy conflicts with the executed security policy or not, if so, turning to a policy selection module, and if not, executing the security policy and the executed security policy;
a policy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Preferably, the system further comprises:
a policy generation module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for defining a security policy and defining the priority of the security policy according to the hierarchy of the security policy; and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
Preferably, the policy generation module is further configured to:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
Preferably, the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
Preferably, the integrity judgment module is configured to:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
Preferably, the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Preferably, the system further comprises a monitoring feedback module for:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
The invention has the beneficial effects that:
according to the technical scheme provided by the invention, the electric power mobile terminal can receive and update the issued security policy in the process of continuing operation by judging whether the security policy meets the integrity requirement or not, judging whether the executed security policy has conflict or not and selecting the security policy to be executed according to the priority, so that the electric power mobile terminal has good stability and real-time performance; meanwhile, the safety strategy is hierarchically controlled, a basis is provided for the electric mobile terminal when the operation safety strategy is selected, and the electric mobile terminal can be hierarchically managed.
Drawings
Fig. 1 is a flowchart of a hierarchical security management and control method for an electric mobile terminal according to the present invention;
FIG. 2 is a schematic structural diagram of a hierarchical security management and control policy model according to the present invention;
fig. 3 is a diagram of a hierarchical security management and control system of an electric mobile terminal according to the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings.
A hierarchical security management method for a power mobile terminal, as shown in fig. 1, the method includes:
step 1: judging whether the security policy received by the electric power mobile terminal meets the integrity requirement, if so, entering the step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy or not, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
and step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Specifically, before the step 1, the method comprises the following steps:
defining a security policy and defining a priority of the security policy according to a hierarchy of the security policy;
and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
For example: the electric mobile terminal is informed in a UDP mode through a send function call Http(s) interface; enabling the electric mobile terminal to call an http(s) interface through a recv function to trigger an OnMessage event to receive the security policy; if the electric mobile operation terminal does not take the message in time, the electric mobile terminal is informed of the coming taking of the message at each heartbeat of the electric mobile terminal so as to ensure that the message is taken by the electric mobile terminal.
Specifically, the defining the security policy includes:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
Specifically, as shown in fig. 2, the defining the priority of the security policy according to the hierarchy of the security policy includes:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
Specifically, the step 1 includes:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
Specifically, the step 3 includes:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Specifically, the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
For example, the electric mobile terminal strategy configuration execution condition is monitored by monitoring the setting state, the terminal health degree evaluation and the strategy configuration execution condition query. Monitoring a setting state, setting a monitor by the mobile terminal, and immediately re-executing correct policy configuration when monitoring that an execution result of the policy configuration is changed, for example, after the mobile terminal executes a Wifi closing policy, when monitoring that Wifi is converted into an open state, re-executing the Wifi closing policy. And evaluating the health degree of the terminal, and scoring according to the execution condition of the strategy configuration of the mobile terminal, wherein the high score and the low score indicate that the strategy configuration is successfully executed more or less. And inquiring the policy configuration execution condition, listing the execution result of each policy configuration, providing the execution result for a user to inquire, marking the normally executed policy configuration as valid, and marking the policy configuration which is not normally executed as invalid.
A hierarchical security management and control system for an electric mobile terminal, as shown in fig. 3, the system includes:
a complete judgment module: the system comprises a conflict judging module, a safety policy control module and a safety policy control module, wherein the conflict judging module is used for judging whether the safety policy received by the electric power mobile terminal meets the integrity requirement or not, if so, the conflict judging module is switched to, and if not, the safety policy is deleted;
a conflict judgment module: judging whether the security policy conflicts with the executed security policy or not, if so, turning to a policy selection module, and if not, executing the security policy and the executed security policy;
a policy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
Specifically, the system further includes:
a policy generation module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for defining a security policy and defining the priority of the security policy according to the hierarchy of the security policy; and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
Specifically, the policy generation module is further configured to:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
Preferably, the policy generation module is further configured to:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
Specifically, the complete judgment module is configured to:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
Specifically, the policy selection module is configured to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
Specifically, the system further comprises a monitoring feedback module, configured to:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.
Claims (14)
1. A hierarchical safety control method of an electric power mobile terminal is characterized by comprising the following steps:
step 1: judging whether the security policy received by the electric power mobile terminal meets the integrity requirement, if so, entering the step 2, and if not, deleting the security policy;
step 2: judging whether the security policy conflicts with the executed security policy or not, if so, executing the step 3, and if not, executing the security policy and the executed security policy;
and step 3: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
2. The method of claim 1, wherein step 1 is preceded by:
defining a security policy and defining a priority of the security policy according to a hierarchy of the security policy;
and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
3. The method of claim 2, wherein the defining a security policy comprises:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
4. The method of claim 2, wherein said defining the priority of the security policy according to the hierarchy of the security policy comprises:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
5. The method of claim 1, wherein step 1, comprises:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
6. The method of claim 1, wherein step 3, comprises:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
7. The method of claim 1, wherein the method further comprises:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
8. The hierarchical safety management and control system of the electric power mobile terminal is characterized by comprising the following components:
a complete judgment module: the system comprises a conflict judging module, a safety policy control module and a safety policy control module, wherein the conflict judging module is used for judging whether the safety policy received by the electric power mobile terminal meets the integrity requirement or not, if so, the conflict judging module is switched to, and if not, the safety policy is deleted;
a conflict judgment module: judging whether the security policy conflicts with the executed security policy or not, if so, turning to a policy selection module, and if not, executing the security policy and the executed security policy;
a policy selection module: and selecting the security policy to be executed according to the priority of the security policy and the executed security policy.
9. The system of claim 8, wherein the system further comprises:
a policy generation module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for defining a security policy and defining the priority of the security policy according to the hierarchy of the security policy; and issuing the security policy with the defined priority to the power mobile terminal by using an interaction protocol based on a JSON format.
10. The system of claim 9, wherein the policy generation module is further to:
defining a policy type and an illegal response action of a security policy;
wherein the policy types include: a terminal operating system control strategy, a terminal network control strategy, a terminal peripheral authority control strategy, a terminal application authority control strategy and a terminal application range control strategy;
the violation responsive action includes: locking the machine, pop-up window reminding, short message reminding and mail reminding.
11. The system of claim 9, wherein the policy generation module is further to:
when the hierarchy of the security policy is a baseline management policy, the execution objects of the security policy are all power mobile terminals, and the priority of the security policy is defined to be high;
when the hierarchy of the security policy is a group management policy, the execution object of the security policy is the electric power mobile terminals grouped according to the preset, and the priority of the electric power mobile terminals is defined as middle;
and when the hierarchy of the security policy is an individual management policy, the execution object of the security policy is an individual electric power mobile terminal specified according to the preset, and the priority of the individual electric power mobile terminal is defined to be low.
12. The system of claim 8, wherein the integrity determination module is to:
and verifying the integrity of the security policy received by the power mobile terminal through a SM3 algorithm.
13. The system of claim 8, wherein the policy selection module is to:
if the priority of the security policy is higher than the priority of the executed security policy or the priority of the security policy is the same as the priority of the executed security policy, executing the security policy and stopping executing the executed security policy;
and if the priority of the executed security policy is higher than that of the security policy, executing the executed security policy and deleting the security policy.
14. The system of claim 8, further comprising a monitoring feedback module to:
and regularly monitoring and feeding back the execution state of the security policy in the electric power mobile terminal, and when the execution state of the security policy is monitored to be violated, feeding back a monitoring result to a server and executing a preset policy violation response action.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810645786.0A CN110636030B (en) | 2018-06-21 | 2018-06-21 | Hierarchical security management and control method and system for electric power mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810645786.0A CN110636030B (en) | 2018-06-21 | 2018-06-21 | Hierarchical security management and control method and system for electric power mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110636030A true CN110636030A (en) | 2019-12-31 |
CN110636030B CN110636030B (en) | 2023-04-21 |
Family
ID=68966513
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810645786.0A Active CN110636030B (en) | 2018-06-21 | 2018-06-21 | Hierarchical security management and control method and system for electric power mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110636030B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111859397A (en) * | 2020-07-23 | 2020-10-30 | 国家工业信息安全发展研究中心 | Terminal protection strategy configuration method and device |
CN112866264A (en) * | 2021-01-25 | 2021-05-28 | 深圳融安网络科技有限公司 | Network security detection method and device, network security equipment and readable storage medium |
CN114205125A (en) * | 2021-11-25 | 2022-03-18 | 北京国泰网信科技有限公司 | Policy management method, device, equipment and medium based on safe area |
CN114513419A (en) * | 2020-11-16 | 2022-05-17 | 北京神州泰岳软件股份有限公司 | Security policy configuration method and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100064341A1 (en) * | 2006-03-27 | 2010-03-11 | Carlo Aldera | System for Enforcing Security Policies on Mobile Communications Devices |
US20110093917A1 (en) * | 2008-06-13 | 2011-04-21 | Byron A Alcorn | Hierarchical Policy Management |
CN102215212A (en) * | 2010-04-02 | 2011-10-12 | 中兴通讯股份有限公司 | Method and architecture for handling conflict of security policies and unified converter |
US20130081104A1 (en) * | 2011-09-23 | 2013-03-28 | Samsung Sds Co., Ltd. | Mobile device management apparatus and method based on security policies and management server for mobile device management |
CN103475478A (en) * | 2013-09-03 | 2013-12-25 | 广东电网公司电力科学研究院 | Terminal safety protection method and equipment |
EP2792186A1 (en) * | 2011-12-14 | 2014-10-22 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
KR101828845B1 (en) * | 2017-04-18 | 2018-02-14 | 주식회사 그리드위즈 | Policy management method |
US20180115470A1 (en) * | 2016-10-26 | 2018-04-26 | Arizona Board Of Regents On Behalf Of Arizona State University | Security policy analysis framework for distributed software defined networking (sdn) based cloud environments |
-
2018
- 2018-06-21 CN CN201810645786.0A patent/CN110636030B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100064341A1 (en) * | 2006-03-27 | 2010-03-11 | Carlo Aldera | System for Enforcing Security Policies on Mobile Communications Devices |
US20110093917A1 (en) * | 2008-06-13 | 2011-04-21 | Byron A Alcorn | Hierarchical Policy Management |
CN102215212A (en) * | 2010-04-02 | 2011-10-12 | 中兴通讯股份有限公司 | Method and architecture for handling conflict of security policies and unified converter |
US20130081104A1 (en) * | 2011-09-23 | 2013-03-28 | Samsung Sds Co., Ltd. | Mobile device management apparatus and method based on security policies and management server for mobile device management |
EP2792186A1 (en) * | 2011-12-14 | 2014-10-22 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
CN103475478A (en) * | 2013-09-03 | 2013-12-25 | 广东电网公司电力科学研究院 | Terminal safety protection method and equipment |
US20180115470A1 (en) * | 2016-10-26 | 2018-04-26 | Arizona Board Of Regents On Behalf Of Arizona State University | Security policy analysis framework for distributed software defined networking (sdn) based cloud environments |
KR101828845B1 (en) * | 2017-04-18 | 2018-02-14 | 주식회사 그리드위즈 | Policy management method |
Non-Patent Citations (3)
Title |
---|
厉颖等: "网络安全管理技术研究", 《软件导刊》 * |
周英: "多域网络安全管理系统策略一致性研究与设计", 《四川文理学院学报》 * |
唐成华等: "基于特征的网络安全策略验证", 《计算机研究与发展》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111859397A (en) * | 2020-07-23 | 2020-10-30 | 国家工业信息安全发展研究中心 | Terminal protection strategy configuration method and device |
CN114513419A (en) * | 2020-11-16 | 2022-05-17 | 北京神州泰岳软件股份有限公司 | Security policy configuration method and system |
CN112866264A (en) * | 2021-01-25 | 2021-05-28 | 深圳融安网络科技有限公司 | Network security detection method and device, network security equipment and readable storage medium |
CN114205125A (en) * | 2021-11-25 | 2022-03-18 | 北京国泰网信科技有限公司 | Policy management method, device, equipment and medium based on safe area |
CN114205125B (en) * | 2021-11-25 | 2024-03-29 | 北京国泰网信科技有限公司 | Policy management method, device, equipment and medium based on security area |
Also Published As
Publication number | Publication date |
---|---|
CN110636030B (en) | 2023-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110636030A (en) | Hierarchical safety management and control method and system for electric power mobile terminal | |
CN105637814B (en) | Be conducive to supervise method, equipment, server and the associated media of online identity | |
CN109391613A (en) | A kind of intelligent substation method for auditing safely based on SCD parsing | |
CN104636678B (en) | The method and system of management and control is carried out under a kind of cloud computing environment to terminal device | |
CN103368973A (en) | Safety system for cloud operating system | |
CN110289965B (en) | Application program service management method and device | |
CN110673938A (en) | Task processing method, system, server and storage medium | |
CN112929180A (en) | Kubernetes zero trust network security system and implementation method thereof | |
CN107797859A (en) | A kind of dispatching method of timed task and a kind of dispatch server | |
CN101018145A (en) | A device and method for remote management | |
CN111897643B (en) | Thread pool configuration system, method, device and storage medium | |
CN108388806A (en) | A kind of Internet of Things security hardening based on block chain and data Right protection device | |
CN113674455A (en) | Intelligent door lock remote control method, device, system, equipment and storage medium | |
CN111031000B (en) | Processing method, device and system of business wind control system and storage medium | |
CN114925391A (en) | Method and device for monitoring circulation of private information, electronic equipment and storage medium | |
CN115001989A (en) | Equipment early warning method, device, equipment and readable storage medium | |
CN108270798B (en) | Mobile terminal equipment safety management system | |
CN116647572B (en) | Access endpoint switching method, device, electronic equipment and storage medium | |
CN107911229A (en) | Based reminding method, device, electronic equipment and the storage medium that operating status changes | |
Rysavy et al. | A formal authorization framework for networked SCADA systems | |
CN114329602B (en) | Access control method, server, electronic equipment and storage medium | |
CN110111210A (en) | A kind of hybrid intelligent social networking system, social contact method and equipment | |
CN115695165A (en) | Automatic operation and maintenance method and system for firewall, electronic equipment and storage medium | |
CN112491614B (en) | Configuration information online automatic validation method and system for embedded equipment | |
CN109165145A (en) | A kind of the service condition statistical method and device of application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |