CN110753025B - Big data security access control method - Google Patents

Big data security access control method Download PDF

Info

Publication number
CN110753025B
CN110753025B CN201910025394.9A CN201910025394A CN110753025B CN 110753025 B CN110753025 B CN 110753025B CN 201910025394 A CN201910025394 A CN 201910025394A CN 110753025 B CN110753025 B CN 110753025B
Authority
CN
China
Prior art keywords
equipment
current
network access
electromagnetic leakage
leakage value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910025394.9A
Other languages
Chinese (zh)
Other versions
CN110753025A (en
Inventor
陈庆梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinrun Ark Technology Co.,Ltd.
Original Assignee
Jinrun Ark Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinrun Ark Technology Co ltd filed Critical Jinrun Ark Technology Co ltd
Priority to CN201910025394.9A priority Critical patent/CN110753025B/en
Publication of CN110753025A publication Critical patent/CN110753025A/en
Application granted granted Critical
Publication of CN110753025B publication Critical patent/CN110753025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R29/00Arrangements for measuring or indicating electric quantities not covered by groups G01R19/00 - G01R27/00
    • G01R29/08Measuring electromagnetic field characteristics
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R33/00Arrangements or instruments for measuring magnetic variables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0815Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/16Service discovery or service management, e.g. service location protocol [SLP] or Web services

Abstract

The invention relates to a big data security access control method, which comprises the following steps of operating a big data security access control system to control the big data security access, wherein the big data security access control system comprises: the request receiving equipment is arranged in the mobile terminal and used for receiving a login request instruction sent by a preset APP when a user inputs a user name and a login password to log in the preset APP running on the mobile terminal; and the hardware analysis equipment is used for accessing the current CPU model of the mobile terminal to obtain corresponding CPU model information when the login request instruction is received. The big data security access control system is safe, reliable and convenient to use.

Description

Big data security access control method
Technical Field
The invention relates to the field of network security, in particular to a big data security access control method.
Background
The network security refers to that the hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates, and the network service is not interrupted.
From the perspective of network operation and managers, it is desirable to protect and control the operations of accessing, reading and writing information of local network, avoid the threats of 'trapdoor', virus, illegal access, denial of service, illegal occupation and illegal control of network resources, and prevent and defend the attack of network hackers. For security and secrecy departments, the departments hope to filter and prevent the illegal, harmful or confidential information related to the country, avoid the leakage of confidential information, avoid the harm to the society and cause huge loss to the country.
Disclosure of Invention
According to an aspect of the present invention, there is provided a big data security access control method, the method including operating a big data security access control system to control big data security access, the big data security access control system including:
The request receiving equipment is arranged in the mobile terminal and used for receiving a login request instruction sent by a preset APP when a user inputs a user name and a login password to log in the preset APP running on the mobile terminal;
The hardware analysis equipment is arranged in the mobile terminal, is connected with the request receiving equipment and is used for accessing the current CPU model of the mobile terminal to obtain corresponding CPU model information when receiving the login request instruction;
The network access equipment is arranged on one side of the hardware analysis equipment and used for searching one or more CPU models bound with a user input user name from a network to be used as one or more safe CPU models when the login request instruction is received;
The data matching equipment is respectively connected with the hardware analysis equipment and the network access equipment and is used for matching the received CPU model information with the one or more safe CPU models, and when the safe CPU models are matched, an authorized login instruction is sent out, otherwise, a login prohibition instruction is sent out;
The leakage measuring equipment is respectively connected with the currently unused suspension pins of the network access equipment, the hardware analysis equipment and the data matching equipment so as to obtain a current electromagnetic leakage value of the currently unused suspension pins of the network access equipment, a current electromagnetic leakage value of the currently unused suspension pins of the hardware analysis equipment and a current electromagnetic leakage value of the currently unused suspension pins of the data matching equipment;
the CP L D device is connected with the leakage measuring equipment and used for receiving a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and a current electromagnetic leakage value of a current unused suspension pin of the data matching equipment, and performing weighted mean operation on the current electromagnetic leakage value of the current unused suspension pin of the network access equipment, the current electromagnetic leakage value of the current unused suspension pin of the hardware analysis equipment and the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment to obtain a reference pin electromagnetic leakage value, and the CP L D device is further used for multiplying the obtained reference pin electromagnetic leakage value by a weighing factor to obtain a silicon wafer entity electromagnetic leakage value of the network access equipment;
The SD memory chip is used for pre-storing a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and three weight values of the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment which respectively participate in weighted mean calculation;
the gear adjusting equipment is respectively connected with the network access equipment and the CP L D device and is used for determining a corresponding down-regulation target gear according to a silicon wafer entity electromagnetic leakage value to realize adjustment of a working gear of the network access equipment when the received silicon wafer entity electromagnetic leakage value exceeds a limited amount, wherein the larger the silicon wafer entity electromagnetic leakage value is, the lower the corresponding down-regulation target gear is;
In the SD memory chip, the current electromagnetic leakage value of the currently unused suspension pin of the network access device, the current electromagnetic leakage value of the currently unused suspension pin of the hardware analysis device and the current electromagnetic leakage value of the currently unused suspension pin of the data matching device are different in size, wherein the three weight values respectively participate in weighted mean calculation;
The speed adjusting device is further used for executing the downward adjustment executing operation of the current data processing speed of the network access device based on the operation speed downward adjustment multiple;
When the preset APP receives the login prohibition instruction, prohibiting a user from accessing data related to a user name input by the user;
The network access equipment searches one or more CPU models bound with a user input user name from a remote server of a preset APP supplier on the network to serve as one or more safe CPU models.
The invention has at least the following three important points:
(1) One or more CPU models bound with a user input user name are adopted as one or more safe CPU models to carry out access safety control on a preset APP;
(2) Automatically distributing the current residual electric quantity according to the historical power consumption level of each device so as to effectively prolong the service time of each device;
(3) And carrying out targeted estimation on the electromagnetic leakage value of the silicon wafer entity of the equipment so as to adjust the working gear of the equipment based on the estimation result, thereby achieving balance between the working effect and the reduction of electromagnetic leakage.
The big data security access control system is safe, reliable and convenient to use. One or more CPU models bound with a user input user name are adopted to serve as one or more safe CPU models to carry out preset APP access safety control, and meanwhile, the current residual electric quantity is automatically distributed according to the historical power consumption level of each device, so that the service time of each device is effectively prolonged.
Drawings
Embodiments of the invention will now be described with reference to the accompanying drawings, in which:
Fig. 1 is a schematic diagram illustrating an arrangement of a mobile terminal interface APP in a big data security access control system according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
Generally, app files are cracked patch files of certain software, namely files that can change unregistered software into registered software. The method for cracking by using the app generally comprises the following steps: the method comprises the steps of copying an app file carried by certain software together into a memory card through a data line or other modes by using a file management program (such as file power), installing a main program, opening file manager software such as FileMan software, finding the app file in the memory card, editing and copying the app file, finding system-apps in a software installation directory, editing and pasting the app file in a software folder, prompting whether the original file is covered or not, and completing decryption by selecting 'yes', namely covering the source file with the file, and completing decryption. Currently, APP is referred to as an application.
In the prior art, one or more CPU models bound with a user input user name cannot be adopted as one or more safe CPU models to perform preset APP access safety control, the current residual electric quantity cannot be automatically distributed according to the historical power consumption level of each device, the service time of each device is effectively prolonged, and the targeted estimation on the silicon wafer entity electromagnetic leakage value of the device cannot be performed.
In order to overcome the defects, the invention builds a big data security access control method, which comprises the step of operating a big data security access control system to control the big data security access, wherein the big data security access control system can effectively solve the corresponding technical problems.
Fig. 1 is a schematic diagram illustrating an arrangement of a mobile terminal interface APP in a big data security access control system according to an embodiment of the present invention.
The big data security access control system shown according to the embodiment of the invention comprises:
The request receiving equipment is arranged in the mobile terminal and used for receiving a login request instruction sent by a preset APP when a user inputs a user name and a login password to log in the preset APP running on the mobile terminal;
The hardware analysis equipment is arranged in the mobile terminal, is connected with the request receiving equipment and is used for accessing the current CPU model of the mobile terminal to obtain corresponding CPU model information when receiving the login request instruction;
The network access equipment is arranged on one side of the hardware analysis equipment and used for searching one or more CPU models bound with a user input user name from a network to be used as one or more safe CPU models when the login request instruction is received;
The data matching equipment is respectively connected with the hardware analysis equipment and the network access equipment and is used for matching the received CPU model information with the one or more safe CPU models, and when the safe CPU models are matched, an authorized login instruction is sent out, otherwise, a login prohibition instruction is sent out;
The leakage measuring equipment is respectively connected with the currently unused suspension pins of the network access equipment, the hardware analysis equipment and the data matching equipment so as to obtain a current electromagnetic leakage value of the currently unused suspension pins of the network access equipment, a current electromagnetic leakage value of the currently unused suspension pins of the hardware analysis equipment and a current electromagnetic leakage value of the currently unused suspension pins of the data matching equipment;
the CP L D device is connected with the leakage measuring equipment and used for receiving a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and a current electromagnetic leakage value of a current unused suspension pin of the data matching equipment, and performing weighted mean operation on the current electromagnetic leakage value of the current unused suspension pin of the network access equipment, the current electromagnetic leakage value of the current unused suspension pin of the hardware analysis equipment and the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment to obtain a reference pin electromagnetic leakage value, and the CP L D device is further used for multiplying the obtained reference pin electromagnetic leakage value by a weighing factor to obtain a silicon wafer entity electromagnetic leakage value of the network access equipment;
The SD memory chip is used for pre-storing a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and three weight values of the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment which respectively participate in weighted mean calculation;
the gear adjusting equipment is respectively connected with the network access equipment and the CP L D device and is used for determining a corresponding down-regulation target gear according to a silicon wafer entity electromagnetic leakage value to realize adjustment of a working gear of the network access equipment when the received silicon wafer entity electromagnetic leakage value exceeds a limited amount, wherein the larger the silicon wafer entity electromagnetic leakage value is, the lower the corresponding down-regulation target gear is;
In the SD memory chip, the current electromagnetic leakage value of the currently unused suspension pin of the network access device, the current electromagnetic leakage value of the currently unused suspension pin of the hardware analysis device and the current electromagnetic leakage value of the currently unused suspension pin of the data matching device are different in size, wherein the three weight values respectively participate in weighted mean calculation;
The speed adjusting device is further used for executing the downward adjustment executing operation of the current data processing speed of the network access device based on the operation speed downward adjustment multiple;
When the preset APP receives the login prohibition instruction, prohibiting a user from accessing data related to a user name input by the user;
The network access equipment searches one or more CPU models bound with a user input user name from a remote server of a preset APP supplier on the network to serve as one or more safe CPU models.
Next, a detailed description of the structure of the big data security access control system of the present invention will be further described.
In the big data security access control system:
the request receiving device, the hardware analysis device and the data matching device are respectively realized by PA L chips with different models.
In the big data security access control system, the method further comprises:
And the electric quantity detection equipment is connected with the lithium battery and used for detecting the residual electric quantity of the lithium battery so as to output the residual electric quantity as real-time residual electric quantity.
In the big data security access control system, the method further comprises:
And the first power consumption counting device is connected with the network access device and used for counting the power consumption of the network access device in unit time based on the historical power consumption data of the network access device so as to output the power consumption as the power consumption in the first unit time.
In the big data security access control system, the method further comprises:
And the second power consumption statistical device is connected with the hardware analysis device and used for counting the power consumption of the hardware analysis device in unit time based on the historical power consumption data of the hardware analysis device to be output as the power consumption of the second unit time.
In the big data security access control system, the method further comprises:
And the electric quantity distribution equipment is respectively connected with the electric quantity detection equipment, the first power consumption statistic equipment and the second power consumption statistic equipment and is used for determining the electric quantity distributed to the network access equipment and the electric quantity distributed to the hardware analysis equipment based on the real-time residual electric quantity, the first unit time power consumption and the second unit time power consumption.
In the big data security access control system:
In the power distribution device, determining the amount of power distributed to the network access device and the amount of power distributed to the hardware analysis device based on the real-time residual power amount, the first unit time power consumption amount, and the second unit time power consumption amount includes: the higher the power consumption per unit time, the more power is allocated to the network access device.
In the big data security access control system:
In the power distribution device, determining the amount of power distributed to the network access device and the amount of power distributed to the hardware analysis device based on the real-time residual power amount, the first unit time power consumption amount, and the second unit time power consumption amount includes: the higher the power consumption per unit time, the more power is allocated to the hardware analysis device.
In the big data security access control system:
And when the preset APP receives the authorized login instruction, allowing the user to access data related to the input user name.
in addition, the CP L D has the characteristics of flexible programming, high integration level, short design and development period, wide application range, advanced development tool, low design and manufacturing cost, low requirement on hardware experience of designers, no need of testing standard products, strong confidentiality, popular price and the like, and can realize larger-scale circuit design, so that the CP L D device is widely applied to prototype design and product production (generally less than 10,000 pieces) of products.
the basic design method is to generate corresponding target files by means of integrated development software platform and schematic diagram, hardware description language, etc. and to transmit the codes to the target chip via download cable (programming in system) to realize the designed digital system.
It is to be understood that while the present invention has been described in conjunction with the preferred embodiments thereof, it is not intended to limit the invention to those embodiments. It will be apparent to those skilled in the art from this disclosure that many changes and modifications can be made, or equivalents modified, in the embodiments of the invention without departing from the scope of the invention. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical essence of the present invention are still within the scope of the protection of the technical solution of the present invention, unless the contents of the technical solution of the present invention are departed.

Claims (9)

1. A big data security access control method, the method comprising operating a big data security access control system to control big data security access, the big data security access control system comprising:
The request receiving equipment is arranged in the mobile terminal and used for receiving a login request instruction sent by a preset APP when a user inputs a user name and a login password to log in the preset APP running on the mobile terminal;
The hardware analysis equipment is arranged in the mobile terminal, is connected with the request receiving equipment and is used for accessing the current CPU model of the mobile terminal to obtain corresponding CPU model information when receiving the login request instruction;
The network access equipment is arranged on one side of the hardware analysis equipment and used for searching one or more CPU models bound with a user input user name from a network to be used as one or more safe CPU models when the login request instruction is received;
The data matching equipment is respectively connected with the hardware analysis equipment and the network access equipment and is used for matching the received CPU model information with the one or more safe CPU models, and when the safe CPU models are matched, an authorized login instruction is sent out, otherwise, a login prohibition instruction is sent out;
The leakage measuring equipment is respectively connected with the currently unused suspension pins of the network access equipment, the hardware analysis equipment and the data matching equipment so as to obtain a current electromagnetic leakage value of the currently unused suspension pins of the network access equipment, a current electromagnetic leakage value of the currently unused suspension pins of the hardware analysis equipment and a current electromagnetic leakage value of the currently unused suspension pins of the data matching equipment;
the CP L D device is connected with the leakage measuring equipment and used for receiving a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and a current electromagnetic leakage value of a current unused suspension pin of the data matching equipment, and performing weighted mean operation on the current electromagnetic leakage value of the current unused suspension pin of the network access equipment, the current electromagnetic leakage value of the current unused suspension pin of the hardware analysis equipment and the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment to obtain a reference pin electromagnetic leakage value, and the CP L D device is further used for multiplying the obtained reference pin electromagnetic leakage value by a weighing factor to obtain a silicon wafer entity electromagnetic leakage value of the network access equipment;
The SD memory chip is used for pre-storing a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and three weight values of the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment which respectively participate in weighted mean calculation;
the gear adjusting equipment is respectively connected with the network access equipment and the CP L D device and is used for determining a corresponding down-regulation target gear according to a silicon wafer entity electromagnetic leakage value to realize adjustment of a working gear of the network access equipment when the received silicon wafer entity electromagnetic leakage value exceeds a limited amount, wherein the larger the silicon wafer entity electromagnetic leakage value is, the lower the corresponding down-regulation target gear is;
In the SD memory chip, the current electromagnetic leakage value of the currently unused suspension pin of the network access device, the current electromagnetic leakage value of the currently unused suspension pin of the hardware analysis device and the current electromagnetic leakage value of the currently unused suspension pin of the data matching device are different in size, wherein the three weight values respectively participate in weighted mean calculation;
The speed adjusting device is used for executing the down-regulation execution operation of the current data processing speed of the network access device based on the operation speed down-regulation multiple;
When the preset APP receives the login prohibition instruction, prohibiting a user from accessing data related to a user name input by the user;
The network access equipment searches one or more CPU models bound with a user input user name from a remote server of a preset APP supplier on the network to serve as one or more safe CPU models.
2. The method of claim 1, wherein:
the request receiving device, the hardware analysis device and the data matching device are respectively realized by PA L chips with different models.
3. The method of claim 2, wherein the system further comprises:
And the electric quantity detection equipment is connected with the lithium battery and used for detecting the residual electric quantity of the lithium battery so as to output the residual electric quantity as real-time residual electric quantity.
4. The method of claim 3, wherein the system further comprises:
And the first power consumption counting device is connected with the network access device and used for counting the power consumption of the network access device in unit time based on the historical power consumption data of the network access device so as to output the power consumption as the power consumption in the first unit time.
5. The method of claim 4, wherein the system further comprises:
And the second power consumption statistical device is connected with the hardware analysis device and used for counting the power consumption of the hardware analysis device in unit time based on the historical power consumption data of the hardware analysis device to be output as the power consumption of the second unit time.
6. The method of claim 5, wherein the system further comprises:
And the electric quantity distribution equipment is respectively connected with the electric quantity detection equipment, the first power consumption statistic equipment and the second power consumption statistic equipment and is used for determining the electric quantity distributed to the network access equipment and the electric quantity distributed to the hardware analysis equipment based on the real-time residual electric quantity, the first unit time power consumption and the second unit time power consumption.
7. The method of claim 6, wherein:
In the power distribution device, determining the amount of power distributed to the network access device and the amount of power distributed to the hardware analysis device based on the real-time residual power amount, the first unit time power consumption amount, and the second unit time power consumption amount includes: the higher the power consumption per unit time, the more power is allocated to the network access device.
8. The method of claim 7, wherein:
In the power distribution device, determining the amount of power distributed to the network access device and the amount of power distributed to the hardware analysis device based on the real-time residual power amount, the first unit time power consumption amount, and the second unit time power consumption amount includes: the higher the power consumption per unit time, the more power is allocated to the hardware analysis device.
9. The method of claim 8, wherein:
And when the preset APP receives the authorized login instruction, allowing the user to access data related to the input user name.
CN201910025394.9A 2019-01-07 2019-01-07 Big data security access control method Active CN110753025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910025394.9A CN110753025B (en) 2019-01-07 2019-01-07 Big data security access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910025394.9A CN110753025B (en) 2019-01-07 2019-01-07 Big data security access control method

Publications (2)

Publication Number Publication Date
CN110753025A CN110753025A (en) 2020-02-04
CN110753025B true CN110753025B (en) 2020-07-24

Family

ID=69275672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910025394.9A Active CN110753025B (en) 2019-01-07 2019-01-07 Big data security access control method

Country Status (1)

Country Link
CN (1) CN110753025B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103178484A (en) * 2011-12-23 2013-06-26 比亚迪股份有限公司 Mobile power source and mobile terminal using same
CN105845998A (en) * 2016-05-03 2016-08-10 珠海市魅族科技有限公司 Display method of charged state and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295384B (en) * 2015-05-21 2020-04-10 中国移动通信集团重庆有限公司 Big data platform access control method and device and authentication server
CN106445763A (en) * 2016-09-09 2017-02-22 中国南方电网有限责任公司电网技术研究中心 Power distribution and utilization big data platform test method and system
CN108258427A (en) * 2017-12-22 2018-07-06 珠海纳睿达科技有限公司 A kind of concealed feed ridge waveguide slot antenna
CN108881309A (en) * 2018-08-14 2018-11-23 北京奇虎科技有限公司 Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103178484A (en) * 2011-12-23 2013-06-26 比亚迪股份有限公司 Mobile power source and mobile terminal using same
CN105845998A (en) * 2016-05-03 2016-08-10 珠海市魅族科技有限公司 Display method of charged state and terminal

Also Published As

Publication number Publication date
CN110753025A (en) 2020-02-04

Similar Documents

Publication Publication Date Title
CN104462970B (en) A kind of Android application program privilege abuse detection methods based on process communication
KR101296483B1 (en) Validation and/or authentication of a device for communication with a network
EP2501100B1 (en) Quarantine network system
KR101558715B1 (en) System and Method for Server-Coupled Malware Prevention
US7877795B2 (en) Methods, systems, and computer program products for automatically configuring firewalls
KR101669694B1 (en) Health-based access to network resources
CN107463838B (en) Method for safety monitoring, device, system and storage medium based on SGX
CN105701423B (en) Date storage method and device applied to high in the clouds payment transaction
EP2860657A1 (en) Determining a security status of potentially malicious files
CN105117544A (en) Android platform App risk assessment method based on mobile cloud computing and Android platform App risk assessment device based on mobile cloud computing
CN101778099A (en) Architecture accessing trusted network for tolerating untrusted components and access method thereof
CN104270250A (en) WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption
CN103581203A (en) Trusted network connection method based on trusted computing
CN106991329A (en) A kind of trust calculation unit and its operation method based on domestic TCM
US20170213023A1 (en) Application Trust Listing Service
RU2680736C1 (en) Malware files in network traffic detection server and method
CN108667828A (en) A kind of risk control method, device and storage medium
CN109889508A (en) A kind of right management method and device
CN110753025B (en) Big data security access control method
CN102968588B (en) Intelligent terminal system
WO2018049813A1 (en) Authority configuration method and device
CN109756499B (en) Big data security access control system
CN106709369A (en) Data processing method and data processing apparatus for terminal exception
CN106714155A (en) Method and device for monitoring access terminal
CN110011848B (en) Mobile operation and maintenance auditing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200619

Address after: Room 1, Unit 13-14, Building 1, Zheshang International, Chagu Avenue, Liuwu New District, Lhasa City, Tibet Autonomous Region, 850000

Applicant after: Jinrun Ark Technology Co.,Ltd.

Address before: 210 000 No. 35 Jiangdong Middle Road, Jianye District, Nanjing City, Jiangsu Province

Applicant before: Chen Qingmei

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant