CN110750764B - Terminal control management method, device, computer equipment and storage medium - Google Patents

Terminal control management method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110750764B
CN110750764B CN201910877118.5A CN201910877118A CN110750764B CN 110750764 B CN110750764 B CN 110750764B CN 201910877118 A CN201910877118 A CN 201910877118A CN 110750764 B CN110750764 B CN 110750764B
Authority
CN
China
Prior art keywords
control
terminal
installation
controls
domain user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910877118.5A
Other languages
Chinese (zh)
Other versions
CN110750764A (en
Inventor
王明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN201910877118.5A priority Critical patent/CN110750764B/en
Publication of CN110750764A publication Critical patent/CN110750764A/en
Application granted granted Critical
Publication of CN110750764B publication Critical patent/CN110750764B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a terminal control management method, a terminal control management device, computer equipment and a storage medium, and belongs to the field of finance. According to the method, the management request input by the domain user is analyzed, whether the management request is an installation request or a repair request is identified, if the management request is the installation request, the installation environment information of the current terminal is obtained to detect whether the terminal accords with the safety environment of the installation control, the control is ensured to be installed in the safety environment, the account authority level of the domain user is identified, a corresponding control installation list is obtained according to the account authority level of the domain user, and the control matched with the function of the domain user is configured for the domain user to use; if the management request is a repair request, the abnormal control can be reinstalled, the installation and repair processes of the control are simple and convenient to operate, the upper examination and approval or remote assistance process is avoided, the experience effect of a user is improved, the time consumption is short, the efficiency of installing the control is high, and meanwhile, the safety of a system in the terminal is guaranteed.

Description

Terminal control management method, device, computer equipment and storage medium
Technical Field
The present invention relates to the field of finance, and in particular, to a method and apparatus for managing terminal controls, a computer device, and a storage medium.
Background
In large enterprises in the financial industry, most of computers used by staff are domain user clients, and are not Administrator users as the user clients in different domains of personal computers are limited by system management authorities, security policies and access control tables, so that no administrator authority exists. While for employees within the enterprise such as: when a customer manager, a seat, an operation and the like work simultaneously, a computer of the customer manager needs to be provided with a working control (such as a professional browser control, a professional video control, a professional telephone control, a professional signature control and the like) which is required to be matched with working contents. These controls are basically installed with security considerations requiring staff authorization with administrator privileges. When installing the controls, staff is required to carry an internal application form to make a white list for installation, or an IT service desk manager colleague is required to remotely assist in installation. The process is tedious, and the installation can be completed only by approval or remote assistance, which takes a long time.
Program management software (such as 360 security guard) configured by the personal computer cannot be applied to a system environment with high security requirements. The current program management software can only install software selected by a user according to the own needs of the user, cannot ensure the running performance (such as stability) and the safety of the system in the installation process of the system, cannot configure the software matched with the working content of the user according to the authority level (such as the function in the company) of the user, and can be used for a long time.
Disclosure of Invention
Aiming at the problem that the employee computer control is limited by authority and can be installed only by upper-layer approval or remote assistance in the enterprise of the financial industry, which is tedious and time-consuming in process, the invention provides a terminal control management method, device, computer equipment and storage medium capable of supporting the automatic installation of the control corresponding to the authority level of the domain user without assistance of other colleagues.
In order to achieve the above purpose, the present invention provides a terminal control management method, which is applied to a terminal, and provides a permission level list of a domain user account and a control installation list corresponding to each permission level; the method comprises the following steps:
s1, collecting a management request input by a domain user;
S2, analyzing the management request, and executing a step S3 when the management request is an installation request; when the management request is a repair request, executing step S5;
s3, acquiring installation environment information of a current terminal, identifying account authority levels of the domain users, and acquiring corresponding control installation lists according to the account authority levels of the domain users;
S4, installing corresponding controls in the terminal based on the control installation list, and ending;
S5, detecting the control in the terminal, acquiring an abnormal control, and reinstalling the abnormal control.
Preferably, the authority level includes: a first level of rights, a second level of rights, and a third level of rights.
Preferably, the control comprises: video controls, and/or telephone controls, and/or signature controls, and/or browsing controls, and/or mail controls, and/or video controls, and/or financial controls, and/or account management controls.
Preferably, in the step S3, installation environment information of the current terminal is obtained, an account authority level of the domain user is identified, and a corresponding control installation list is obtained according to the account authority level of the domain user, including:
S31, detecting the running environment information of the current terminal, judging whether the terminal has a vulnerability according to the running environment information, and if so, executing a step S32; if not, executing step S33;
s32, scanning terminal loopholes and repairing, and executing a step S33;
s33, traversing the authority level list according to the account of the domain user, and acquiring an account authority level corresponding to the account of the domain user;
s34, traversing the control installation list according to the account authority level, and acquiring a control installation list corresponding to the account authority level.
Preferably, each control in the control installation list is matched with a corresponding installation file;
step S4, installing a corresponding control in the terminal based on the control installation list, including:
S41, detecting the running environment information of the current terminal, judging whether the terminal has a vulnerability according to the running environment information, and if so, executing a step S42; if not, go to step S43;
S42, scanning terminal loopholes and repairing, and executing a step S43;
s43, traversing the control installation list, extracting a control according to the ordering of the controls, inquiring whether the registration information of the control exists in a registry of the terminal, and if yes, executing a step S44; if not, executing step S45;
S44, judging whether the control items in the control installation list are all traversed, if yes, ending; if not, go to step S43;
S45, acquiring an installation file of the control, installing the installation file in the terminal, and executing step S43 after the installation is completed.
Preferably, step S5 detects a control in the terminal, obtains an abnormal control, and reinstalls the abnormal control, including:
And detecting configuration information of the controls in turn according to the control information of the registry in the terminal, and reinstalling the controls with abnormal configuration information.
Preferably, the detecting the configuration information of the control according to the control information of the registry in the terminal in turn, reinstalling the control with abnormal configuration information, includes:
s51, traversing control registration information in the registry, extracting a control according to the ordering of the control registration information, detecting whether configuration information of the control is abnormal, and if yes, executing a step S52; if not, executing step S53;
S52, acquiring an installation file of a control with abnormal configuration information, installing the installation file in the terminal, and executing step S53;
S53, judging whether the control registration information in the registry is traversed completely or not, if yes, ending; if not, step S51 is performed.
In order to achieve the above object, the present invention provides a terminal control management device, which is applied to a terminal, and includes:
A first storage unit for storing a permission level list of the domain user account;
The second storage unit is used for storing a control installation list corresponding to each authority level;
the acquisition unit is used for acquiring a management request input by a domain user;
the analysis unit is used for analyzing the management request;
The processing unit is used for acquiring the installation environment information of the current terminal, identifying the account authority level of the domain user when the management request is an installation request, and acquiring a corresponding control installation list according to the account authority level of the domain user;
the installation unit is used for installing corresponding controls in the terminal based on the control installation list and ending;
And the repair unit is used for detecting the control in the terminal when the management request is a repair request, acquiring an abnormal control and reinstalling the abnormal control.
To achieve the above object, the present invention provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, which processor, when executing the computer program, implements the steps of the above method.
To achieve the above object, the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above method.
According to the terminal control management method, the device, the computer equipment and the storage medium, the management request input by the domain user is analyzed, whether the management request is an installation request or a repair request is identified, if the management request is the installation request, the installation environment information of the current terminal is obtained to detect whether the terminal accords with the safety environment of the installation control, the control is ensured to be installed in the safety environment, the account authority level of the domain user is identified, a corresponding control installation list is obtained according to the account authority level of the domain user, the installation is automatically carried out according to the control installation list, and the domain user is configured with the control matched with the function of the domain user for use by the domain user; if the management request is a repair request, the control in the terminal is detected, the abnormal control can be reinstalled, the installation and repair processes of the control are simple and convenient to operate, the upper layer approval or remote assistance process is avoided, the experience effect of a user is improved, the time consumption is short, the efficiency of installing the control is high, and meanwhile, the safety of an internal system of the terminal is guaranteed.
Drawings
FIG. 1 is a flow chart of one embodiment of a terminal control management method according to the present invention;
FIG. 2 is a flowchart of another embodiment of a terminal control management method according to the present invention;
FIG. 3 is a block diagram of an embodiment of a terminal control management device according to the present invention;
Fig. 4 is a schematic diagram of a hardware architecture of an embodiment of a computer device according to the present invention.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terminal control management method, the device, the computer equipment and the storage medium are suitable for the field of financial industry (such as inside a bank), and provide the control management method which does not need other staff to cooperate (such as approval or remote assistance) and can automatically install the control matched with the level according to the authority level of the staff. Analyzing a management request input by a domain user, identifying whether the management request is an installation request or a repair request, if the management request is the installation request, acquiring installation environment information of a current terminal to detect whether the terminal accords with a safe environment of an installation control, ensuring that the control is installed in the safe environment, identifying an account authority level of the domain user, acquiring a corresponding control installation list according to the account authority level of the domain user, automatically installing according to the control installation list, and configuring a control matched with the function of the domain user for the domain user; if the management request is a repair request, the control in the terminal is detected, the abnormal control can be reinstalled, the installation and repair processes of the control are simple and convenient to operate, the upper layer approval or remote assistance process is avoided, the experience effect of a user is improved, the time consumption is short, the efficiency of installing the control is high, and meanwhile, the safety of an internal system of the terminal is guaranteed.
Example 1
Referring to fig. 1, a terminal control management method of the present embodiment is applied to a terminal, and provides a permission level list of a domain user account and a control installation list corresponding to each permission level;
wherein the permission level may include: a first level of rights, a second level of rights, and a third level of rights. The control may include: video controls, and/or telephone controls, and/or signature controls, and/or browsing controls, and/or mail controls, and/or video controls, and/or financial controls, and/or account management controls.
By way of example and not limitation, the user corresponding to the first permission level may be a user of a customer manager level, the user corresponding to the second permission level may be a user of an agent level, and the user corresponding to the third permission level may be a user of an operator level. Each authority level corresponds to a different control, and the authority levels of different functions correspond to different controls. Such as: the control installation manifest corresponding to the client manager level may include: video control, signature control, browsing control, image control, mail control and financial control; the control installation list corresponding to the seat personnel level can comprise: telephone controls, signature controls, browsing controls, mail controls, and financial controls; the control installation list corresponding to the operator level may include: account management controls, signature controls, browsing controls, mail controls, video controls, and financial controls.
It should be noted that: the terminal may be a computer used by an employee within the bank.
The terminal control management method can comprise the following steps:
s1, collecting a management request input by a domain user;
S2, analyzing the management request, and executing a step S3 when the management request is an installation request; when the management request is a repair request, executing step S5;
In practical application, the installation request can form a button control installed by one key, the button control is displayed in a display of the terminal, when a domain user triggers the button, the installation request is obtained, and corresponding operation is executed; the repair request can form a button control for one-key repair, the button control is displayed in a display of the terminal, and when a domain user triggers the button, the repair request is acquired, and corresponding operation is executed.
S3, acquiring installation environment information of a current terminal, identifying account authority levels of the domain users, and acquiring corresponding control installation lists according to the account authority levels of the domain users;
In this step, since the authority levels corresponding to the user accounts of each domain may be different, a control installation list corresponding to the authority level of the user account of the domain needs to be obtained, so as to achieve the purpose of installing the control corresponding to the authority level of the user in the domain.
Specifically, the step S3 obtains the installation environment information of the current terminal, identifies the account authority level of the domain user, and obtains the corresponding control installation list according to the account authority level of the domain user, and referring to fig. 2, the method includes:
S31, detecting the running environment information of the current terminal, judging whether the terminal has a vulnerability according to the running environment information, and if so, executing a step S32; if not, executing step S33;
s32, scanning terminal loopholes and repairing, and executing a step S33;
s33, traversing the authority level list according to the account of the domain user, and acquiring an account authority level corresponding to the account of the domain user;
s34, traversing the control installation list according to the account authority level, and acquiring a control installation list corresponding to the account authority level.
S4, installing corresponding controls in the terminal based on the control installation list, and ending;
it should be noted that: each control in the control installation list is matched with a corresponding installation file;
Specifically, the step S4 of installing the corresponding control in the terminal based on the control installation list includes:
S41, detecting the running environment information of the current terminal, judging whether the terminal has a vulnerability according to the running environment information, and if so, executing a step S42; if not, go to step S43;
S42, scanning terminal loopholes and repairing, and executing a step S43;
s43, traversing the control installation list, extracting a control according to the ordering of the controls, inquiring whether the registration information of the control exists in a registry of the terminal, and if yes, executing a step S44; if not, executing step S45;
S44, judging whether the control items in the control installation list are all traversed, if yes, ending; if not, go to step S43;
S45, acquiring an installation file of the control, installing the installation file in the terminal, and executing step S43 after the installation is completed.
In the process of installing the control, the domain user can manually select to install or can install all the controls by one key. The domain user can select different installation modes according to the needs of the domain user. For example: the terminal is provided with a plurality of controls to be installed, a user can select a one-key installation mode, uninstalled controls are obtained by traversing the control installation list, and all the controls to be installed are automatically installed. The installation file of the control is configured with installation path data, the control can be installed according to the installation path data during installation, and the configuration file of the control is stored under a preset terminal path.
S5, detecting the control in the terminal, acquiring an abnormal control, and reinstalling the abnormal control.
In practical application, if a user uses a control, it is found that abnormal use cannot occur (such as the control cannot be started, cannot be opened or does not respond, etc.), the abnormal control can be confirmed by detecting control configuration information, and the abnormal control is reinstalled.
By way of example and not limitation, when an abnormality occurs in an image control, and a file scan cannot be uploaded to an operating system normally, a repair request is input, and the image control can be reinstalled for repair.
In step S5, configuration information of the controls is sequentially detected according to control information of the registry in the terminal, and controls with abnormal configuration information are reinstalled.
Specifically, step S5 may include:
s51, traversing control registration information in the registry, extracting a control according to the ordering of the control registration information, detecting whether configuration information of the control is abnormal, and if yes, executing a step S52; if not, executing step S53;
S52, acquiring an installation file of a control with abnormal configuration information, installing the installation file in the terminal, and executing step S53;
S53, judging whether the control registration information in the registry is traversed completely or not, if yes, ending; if not, execute
In the step, the method is mainly used for detecting and repairing all the controls in the terminal, and the abnormal controls are obtained by traversing the control registration information in the registry and detecting the configuration information of each control one by one, so that the purpose of repairing the abnormal controls is achieved.
In this embodiment, by analyzing a management request input by a domain user, identifying whether the management request is an installation request or a repair request, if the management request is the installation request, acquiring installation environment information of a current terminal to detect whether the terminal accords with a security environment of an installation control, ensuring that the control is installed in the security environment, identifying an account authority level of the domain user, acquiring a corresponding control installation list according to the account authority level of the domain user, automatically installing according to the control installation list, and configuring a control matched with the function of the domain user for the domain user to use; if the management request is a repair request, the control in the terminal is detected, the abnormal control can be reinstalled, the installation and repair processes of the control are simple and convenient to operate, the upper layer approval or remote assistance process is avoided, the experience effect of a user is improved, the time consumption is short, the efficiency of installing the control is high, and meanwhile, the safety of an internal system of the terminal is guaranteed.
Example two
Referring to fig. 3, a terminal control management apparatus 1 of the present embodiment is applied to a terminal, and includes:
A first storage unit 11 for storing a permission level list of a domain user account;
A second storage unit 12, configured to store a control installation list corresponding to each authority level;
wherein the permission level may include: a first level of rights, a second level of rights, and a third level of rights. The control may include: video controls, and/or telephone controls, and/or signature controls, and/or browsing controls, and/or mail controls, and/or video controls, and/or financial controls, and/or account management controls.
The acquisition unit 13 is used for acquiring a management request input by a domain user;
A parsing unit 14, configured to parse the management request;
In practical application, the installation request can form a button control installed by one key, the button control is displayed in a display of the terminal, when a domain user triggers the button, the installation request is obtained, and corresponding operation is executed; the repair request can form a button control for one-key repair, the button control is displayed in a display of the terminal, and when a domain user triggers the button, the repair request is acquired, and corresponding operation is executed.
The processing unit 15 is configured to obtain installation environment information of a current terminal, identify an account authority level of the domain user when the management request is an installation request, and obtain a corresponding control installation list according to the account authority level of the domain user;
Because the authority levels corresponding to the user accounts of each domain may be different, a control installation list corresponding to the authority level of the user account of the domain needs to be acquired so as to achieve the purpose of installing the control corresponding to the authority level of the user in the domain.
An installation unit 16, configured to install a corresponding control in the terminal based on the control installation list, and end;
It should be noted that: and each control in the control installation list is matched with a corresponding installation file.
And the repair unit 17 is configured to detect a control in the terminal when the management request is a repair request, obtain an abnormal control, and reinstall the abnormal control.
In this embodiment, by analyzing a management request input by a domain user, identifying whether the management request is an installation request or a repair request, if the management request is the installation request, acquiring installation environment information of a current terminal to detect whether the terminal accords with a security environment of an installation control, ensuring that the control is installed in the security environment, identifying an account authority level of the domain user, acquiring a corresponding control installation list according to the account authority level of the domain user, automatically installing according to the control installation list, and configuring a control matched with the function of the domain user for the domain user to use; if the management request is a repair request, the control in the terminal is detected, the abnormal control can be reinstalled, the installation and repair processes of the control are simple and convenient to operate, the upper layer approval or remote assistance process is avoided, the experience effect of a user is improved, the time consumption is short, the efficiency of installing the control is high, and meanwhile, the safety of an internal system of the terminal is guaranteed.
Example III
In order to achieve the above objective, the present invention further provides a computer device, where the computer device 2 includes a plurality of computer devices, and the components of the terminal control management apparatus 1 in the second embodiment may be dispersed in different computer devices 2, and the computer device 2 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server, or a rack server (including a stand-alone server, or a server cluster formed by a plurality of servers) that execute a program, and so on. The computer device 2 of the present embodiment includes at least, but is not limited to: the memory 21, the processor 22, the network interface 23, and the terminal control management device 1 (refer to fig. 4) which can be communicatively connected to each other through a system bus. It should be noted that fig. 4 only shows a computer device 2 having components, but it should be understood that not all of the illustrated components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the memory 21 includes at least one type of computer readable storage medium, including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read-only memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the memory 21 may be an internal storage unit of the computer device 2, such as a hard disk or a memory of the computer device 2. In other embodiments, the memory 21 may also be an external storage device of the computer device 2, such as a plug-in hard disk provided on the computer device 2, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD), or the like. Of course, the memory 21 may also comprise both an internal memory unit of the computer device 2 and an external memory device. In this embodiment, the memory 21 is generally used to store an operating system and various application software installed on the computer device 2, such as program codes of the terminal control management method of the first embodiment. Further, the memory 21 may be used to temporarily store various types of data that have been output or are to be output.
The processor 22 may be a central processing unit 22 (Central Processing Unit, CPU), controller, microcontroller, microprocessor 22, or other data processing chip in some embodiments. The processor 22 is typically used to control the overall operation of the computer device 2, such as performing control and processing related to data interaction or communication with the computer device 2. In this embodiment, the processor 22 is configured to execute the program code or process data stored in the memory 21, for example, execute the terminal control management device 1 and the like.
The network interface 23 may comprise a wireless network interface 23 or a wired network interface 23, which network interface 23 is typically used for establishing a communication connection between the computer device 2 and other computer devices 2. For example, the network interface 23 is used to connect the computer device 2 to an external terminal through a network, establish a data transmission channel and a communication connection between the computer device 2 and the external terminal, and the like. The network may be an Intranet (Intranet), the Internet (Internet), a global system for mobile communications (Global System of Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), a 4G network, a 5G network, bluetooth (Bluetooth), wi-Fi, or other wireless or wired network.
It is noted that fig. 4 only shows a computer device 2 having components 21-23, but it is understood that not all of the illustrated components are required to be implemented, and that more or fewer components may alternatively be implemented.
In this embodiment, the terminal control management device 1 stored in the memory 21 may also be divided into one or more program modules, which are stored in the memory 21 and executed by one or more processors 22 (the processor 22 in this embodiment) to complete the present invention.
Embodiment four:
To achieve the above object, the present invention also provides a computer-readable storage medium including a plurality of storage media such as a flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application store, etc., on which a computer program is stored, which when executed by the processor 22, performs the corresponding functions. The computer-readable storage medium of the present embodiment is used for storing the terminal control management apparatus 1, and when executed by the processor 22, implements the terminal control management method of the first embodiment.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (9)

1. A terminal control management method is applied to a terminal and is characterized in that a permission level list of a domain user account and a control installation list corresponding to each permission level are provided; the method comprises the following steps:
s1, collecting a management request input by a domain user;
S2, analyzing the management request, and executing a step S3 when the management request is an installation request; when the management request is a repair request, executing step S5;
s3, acquiring installation environment information of a current terminal, identifying account authority levels of the domain users, and acquiring corresponding control installation lists according to the account authority levels of the domain users;
S4, installing corresponding controls in the terminal based on the control installation list, and ending;
s5, detecting the control in the terminal, acquiring an abnormal control, and reinstalling the abnormal control;
In the step S3, installation environment information of the current terminal is obtained, an account authority level of the domain user is identified, and a corresponding control installation list is obtained according to the account authority level of the domain user, including:
S31, detecting the running environment information of the current terminal, judging whether the terminal has a vulnerability according to the running environment information, and if so, executing a step S32; if not, executing step S33;
s32, scanning terminal loopholes and repairing, and executing a step S33;
s33, traversing the authority level list according to the account of the domain user, and acquiring an account authority level corresponding to the account of the domain user;
s34, traversing the control installation list according to the account authority level, and acquiring a control installation list corresponding to the account authority level.
2. The terminal control management method according to claim 1, wherein the authority level includes: a first level of rights, a second level of rights, and a third level of rights.
3. The terminal control management method according to claim 1, wherein the control comprises: video controls, and/or telephone controls, and/or signature controls, and/or browsing controls, and/or mail controls, and/or video controls, and/or financial controls, and/or account management controls.
4. The terminal control management method according to claim 1, wherein each control in the control installation list is matched with a corresponding installation file;
step S4, installing a corresponding control in the terminal based on the control installation list, including:
S41, detecting the running environment information of the current terminal, judging whether the terminal has a vulnerability according to the running environment information, and if so, executing a step S42; if not, go to step S43;
S42, scanning terminal loopholes and repairing, and executing a step S43;
s43, traversing the control installation list, extracting a control according to the ordering of the controls, inquiring whether the registration information of the control exists in a registry of the terminal, and if yes, executing a step S44; if not, executing step S45;
S44, judging whether the control items in the control installation list are all traversed, if yes, ending; if not, go to step S43;
S45, acquiring an installation file of the control, installing the installation file in the terminal, and executing step S43 after the installation is completed.
5. The method for managing terminal controls according to claim 1, wherein the step S5 of detecting the controls in the terminal to obtain abnormal controls and reinstalling the abnormal controls includes:
And detecting configuration information of the controls in turn according to the control information of the registry in the terminal, and reinstalling the controls with abnormal configuration information.
6. The terminal control management method according to claim 5, wherein detecting configuration information of controls in turn according to control information of a registry in the terminal, reinstalling controls having abnormal configuration information, comprises:
s51, traversing control registration information in the registry, extracting a control according to the ordering of the control registration information, detecting whether configuration information of the control is abnormal, and if yes, executing a step S52; if not, executing step S53;
S52, acquiring an installation file of a control with abnormal configuration information, installing the installation file in the terminal, and executing step S53;
S53, judging whether the control registration information in the registry is traversed completely or not, if yes, ending; if not, step S51 is performed.
7. A terminal control management device, applied to a terminal, comprising:
A first storage unit for storing a permission level list of the domain user account;
The second storage unit is used for storing a control installation list corresponding to each authority level;
the acquisition unit is used for acquiring a management request input by a domain user;
the analysis unit is used for analyzing the management request;
The processing unit is used for acquiring the installation environment information of the current terminal, identifying the account authority level of the domain user when the management request is an installation request, and acquiring a corresponding control installation list according to the account authority level of the domain user;
the installation unit is used for installing corresponding controls in the terminal based on the control installation list and ending;
The repair unit is used for detecting the control in the terminal when the management request is a repair request, acquiring an abnormal control and reinstalling the abnormal control;
The method for acquiring the installation environment information of the current terminal, identifying the account authority level of the domain user, and acquiring the corresponding control installation list according to the account authority level of the domain user comprises the following steps:
Detecting the running environment information of the current terminal, judging whether the terminal has a vulnerability according to the running environment information, and if so, executing step S32; if not, executing step S33;
Scanning the terminal loopholes and repairing, and executing step S33;
traversing the authority level list according to the account of the domain user, and acquiring an account authority level corresponding to the account of the domain user;
traversing the control installation list according to the account authority level, and acquiring a control installation list corresponding to the account authority level.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of any one of claims 1 to 6 when the computer program is executed.
9. A computer-readable storage medium having stored thereon a computer program, characterized by: which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
CN201910877118.5A 2019-09-17 2019-09-17 Terminal control management method, device, computer equipment and storage medium Active CN110750764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910877118.5A CN110750764B (en) 2019-09-17 2019-09-17 Terminal control management method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910877118.5A CN110750764B (en) 2019-09-17 2019-09-17 Terminal control management method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110750764A CN110750764A (en) 2020-02-04
CN110750764B true CN110750764B (en) 2024-06-04

Family

ID=69276604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910877118.5A Active CN110750764B (en) 2019-09-17 2019-09-17 Terminal control management method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110750764B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012014596A (en) * 2010-07-02 2012-01-19 Ricoh Co Ltd Software management device, information processor, software distribution system, and installation method and program
CN103646215A (en) * 2013-12-23 2014-03-19 北京奇虎科技有限公司 Application installation control method, related system and related device
CN106919843A (en) * 2017-01-24 2017-07-04 北京奇虎科技有限公司 Leak repair system, method and apparatus
CN106990989A (en) * 2017-04-06 2017-07-28 北京小米移动软件有限公司 The method and device for controlling application program to install

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012014596A (en) * 2010-07-02 2012-01-19 Ricoh Co Ltd Software management device, information processor, software distribution system, and installation method and program
CN103646215A (en) * 2013-12-23 2014-03-19 北京奇虎科技有限公司 Application installation control method, related system and related device
CN106919843A (en) * 2017-01-24 2017-07-04 北京奇虎科技有限公司 Leak repair system, method and apparatus
CN106990989A (en) * 2017-04-06 2017-07-28 北京小米移动软件有限公司 The method and device for controlling application program to install

Also Published As

Publication number Publication date
CN110750764A (en) 2020-02-04

Similar Documents

Publication Publication Date Title
US10965547B1 (en) Methods and systems to manage data objects in a cloud computing environment
US9426182B1 (en) Context-based authentication of mobile devices
US10091220B2 (en) Platform for protecting small and medium enterprises from cyber security threats
CN109150828B (en) Verification registration method and system
US9146975B2 (en) Systems and methods for integration of business applications with enterprise content management systems
CN111416811B (en) Unauthorized vulnerability detection method, system, equipment and storage medium
US11128543B2 (en) Enrollment data visualization using enhanced graphical user interface elements
US20080183603A1 (en) Policy enforcement over heterogeneous assets
US20140223535A1 (en) Information processing system, information processing device, and authentication information management method
CN110619206A (en) Operation and maintenance risk control method, system, equipment and computer readable storage medium
CN112000719A (en) Data security situation awareness system, method, device and storage medium
CN109039812B (en) Port detection method, system and computer readable storage medium
CN109684863B (en) Data leakage prevention method, device, equipment and storage medium
US20150052579A1 (en) Organizational attribution of user devices
US11750595B2 (en) Multi-computer processing system for dynamically evaluating and controlling authenticated credentials
CN103176987A (en) Method and device for controlling database access
CN110750764B (en) Terminal control management method, device, computer equipment and storage medium
KR101056268B1 (en) Security check system and method for a terminal device capable of computer communication
WO2020251860A1 (en) Previewing impacted entities in automated device definitions
JP2020095459A (en) History monitoring method, monitoring processor and monitoring processing program
CN114465766B (en) SSH-based remote access method and device, electronic equipment and storage medium
CN114095269A (en) System detection method, device, electronic equipment and storage medium
CN112367339B (en) System security login management method and device
Jung et al. Practical experience gained from modeling security goals: using SGITs in an industrial project
CN114095230B (en) Data processing method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant