CN111651756A - Automatic substitution and filling method applied to operation and maintenance audit navicat - Google Patents
Automatic substitution and filling method applied to operation and maintenance audit navicat Download PDFInfo
- Publication number
- CN111651756A CN111651756A CN202010500851.8A CN202010500851A CN111651756A CN 111651756 A CN111651756 A CN 111651756A CN 202010500851 A CN202010500851 A CN 202010500851A CN 111651756 A CN111651756 A CN 111651756A
- Authority
- CN
- China
- Prior art keywords
- maintenance
- navicat
- substitution
- target asset
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The invention discloses an automatic substitution and filling method applied to operation and maintenance audit navicat, which comprises the following steps: 1) deploying a substitution tool in a windows system with an operation and maintenance operating system in advance; 2) capturing a target asset to be operated and maintained through an operation and maintenance auditing system, and generating an operation and maintenance URI (Uniform resource identifier) containing a target asset information ciphertext; 3) the operation and maintenance URI starts a substitution and filling tool and transmits the related information ciphertext of the target asset to the substitution and filling tool; 4) the substitution and filling tool analyzes the received target asset related information ciphertext, extracts related information, configures the related information in a windows registry to form session content, and starts a Navicat client; 5) the Navicat client directly pulls the related information ciphertext of the target asset from the Windows registry, restores the real password, and the operation and maintenance auditing system is accessed to the target asset needing operation and maintenance to form a passage with the Navicat client. The method and the device can effectively solve the problem of account information leakage caused by contact of an operation and maintenance person with an asset password in a Windows operation and maintenance environment, reduce operation and maintenance steps of the operation and maintenance person and improve working efficiency.
Description
Technical Field
The invention relates to the technical field of technical network information, in particular to an automatic substitution and filling method applied to operation and maintenance audit navicat.
Background
The operation and maintenance auditing system is a new generation of operation and maintenance safety auditing product, can carry out fine-grained authorization, operation record and control of the whole process, omnibearing operation auditing and support the function of replaying the operation process afterwards on the access process of operation and maintenance personnel, realizes 'precaution, control in the process and audit afterwards' in the operation and maintenance process, simplifies operation and maintenance operation, comprehensively solves the operation and maintenance safety problems in various complex environments and improves the IT operation and maintenance management level of enterprises. The Navicat is a set of database management tools which are rapid, reliable and quite cheap, and is specially designed for simplifying the management of the database and reducing the management cost of the system. Navicat is built with an intuitive graphical user interface that allows you to create, organize, access, and share information in a secure and simple manner. The traditional Navicat operation and maintenance model mainly adopts the manual configuration of the target asset address and the operation and maintenance auditing system address. The mode of carrying out operation and maintenance through the manual configuration of an operation and maintenance person has numerous drawbacks, for example, the asset password has a leakage risk, and the operation and maintenance person logs in the target asset and has obtained the asset password, so it is difficult to ensure the security and reliability of the operated and maintained asset password, and in addition, the traditional operation and maintenance cost is large: when the operation and maintenance personnel need to perform operation and maintenance, account password configuration needs to be performed on the target asset account and the operation and maintenance auditing system account respectively, and the configuration cost is high and the operation is complicated.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide the automatic replacement filling method applied to the operation and maintenance audit navicat, which can effectively solve the problem of account information leakage caused by the fact that an operation and maintenance person contacts an asset password in a Windows operation and maintenance environment, reduce the operation and maintenance steps of the operation and maintenance person and improve the working efficiency.
In order to achieve the purpose, the invention is realized by the following technical scheme: an automatic substitution and filling method applied to operation and maintenance audit navicat comprises the following steps:
(1) deploying a substitution tool in a windows system with an operation and maintenance operating system in advance;
(2) capturing a target asset to be operated and maintained through an operation and maintenance auditing system, and generating an operation and maintenance URI (Uniform resource identifier) containing a target asset information ciphertext;
(3) the operation and maintenance URI starts a pre-deployed substitution filling tool and transmits the related information ciphertext of the target asset to the substitution filling tool;
(4) the substitution and filling tool analyzes the received target asset related information ciphertext, extracts related information, configures the related information in a windows registry to form session content, and then starts a Navicat client by the substitution and filling tool;
(5) the Navicat client directly pulls the target asset related information ciphertext from the Windows registry and restores the target asset related information ciphertext into the real password of the target asset related information, then the Navicat client accesses the operation and maintenance auditing system through the session content configured by the filling tool, and the operation and maintenance auditing system accesses the target asset needing operation and maintenance and forms a passage with the Navicat client.
In order to better implement the method of the present invention, further, in step (1), when a replacement filling tool is deployed in advance, firstly, the resolving capability of the operation and maintenance uri in the operation and maintenance auditing system needs to be registered in the windows system registry of the current user.
In order to better implement the method of the present invention, further, in step (1), the pre-deployed agent can actively discover the Navicat client deployed on the default path, and if the agent cannot be actively discovered during the deployment process, a popup prompt is generated to require the user to actively specify the position of the Navicat client.
In order to better implement the method of the present invention, further, in step (1), the pre-deployed fill-in tool needs to grant the right to access the registry of the windows system.
In order to better implement the method of the present invention, further, the target asset information ciphertext in the operation and maintenance URI in step (2) is formed by a binary stream encoded by Base64, wherein the target asset information ciphertext contains an account password ciphertext of the target asset.
In order to better implement the method of the present invention, further, the target asset information ciphertext is calculated by using the same encryption algorithm as that of the Navicat client.
In order to better implement the method of the present invention, in the step (4), the filling tool includes a Base64 decoding module and a character extracting module, the Base64 decoding module can decode the binary stream encoded by the Base64 in the operation and maintenance URI, convert it into characters, and then the characters are scanned and extracted by the character extracting module, where the extracted data includes the type of the database and the parameter values of the database.
In order to better implement the method of the present invention, further, the extracted database type includes at least one of Mysql, Oracle, SQL Server, and Postgresql.
In order to better implement the method of the present invention, further, in step (4), the extracted related information is configured in the windows registry, and a specific process of forming the session content is as follows: and writing the substitute filling tool into the corresponding position of each type of database in the windows registry according to the extracted database type and the parameter value of the database according to the session configuration format of the Navicat client, thereby forming the session content configured by the substitute filling tool.
In order to better implement the method of the present invention, further, in the step (5), the session configuration parameters at the corresponding positions in the Windows registry are prepared and generated by a substitution tool in advance, the assets to be operated and maintained at this time can be directly pulled, the passwords are stored in the registry in a form of ciphertext, and as the password ciphertext sent by the operation and maintenance auditing system is encrypted by using the encryption mode of Navicat, the Navicat can restore the real passwords of the assets through the encryption and decryption module of the client.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) the invention adopts an automatic replacement filling mode, can well solve the complicated process that the user needs to manually carry out operation and maintenance access, and avoids the possible leakage risk caused by the direct perception of asset passwords by an operation and maintenance operator;
(2) the invention carries out the same encryption processing aiming at Navicat through the same password, and carries out the substitution filling operation on the substitution filling tool by taking the password as a starting parameter through the URI protocol in a ciphertext mode when the password goes out of the operation and maintenance management system, thereby avoiding the leakage problem caused by stealing the password in the transmission process;
(3) compared with the traditional method for automatically filling the secret key, the method can directly select the target asset needing operation and maintenance only by obtaining authorization, the Navicat client is accessed into the operation and maintenance auditing system to operate and maintain the target asset, an operation and maintenance person cannot sense the operation and maintenance auditing system in the whole encryption process, the safety performance is high, the operation and maintenance access operation steps of the operation and maintenance person are obviously reduced, the operation and maintenance efficiency is greatly improved, and the method is suitable for wide popularization and application.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The present invention will be described in further detail with reference to the following examples for the purpose of making clear the objects, process conditions and advantages of the present invention, but the embodiments of the present invention are not limited thereto, and various substitutions and modifications can be made according to the common technical knowledge and the conventional means in the art without departing from the technical idea of the present invention described above, and the specific examples described herein are only for explaining the present invention and are not intended to limit the present invention.
Some module names and definitions are as follows:
automatic replacement filling: method for automatically writing parameters into input box appointed in advance by setting parameters
Navicat client: a set of fast, reliable and cheap database management tools is provided for simplifying the management of database and reducing the management cost of system. Navicat is built with an intuitive graphical user interface that allows you to create, organize, access, and share information in a secure and simple manner.
Operation and maintenance auditing system: the new generation of operation and maintenance safety audit product can carry out fine-grained authorization, operation recording and control in the whole process, omnibearing operation audit and support the function of replaying the operation process afterwards on the access process of operation and maintenance personnel, realizes 'precaution, control in the process and audit afterwards' in the operation and maintenance process, comprehensively solves the operation and maintenance safety problems in various complex environments while simplifying operation and maintenance operation, and improves the IT operation and maintenance management level of enterprises.
Example 1:
as shown in fig. 1, the main workflow of this embodiment includes the following steps:
(1) deploying a substitution tool in a windows system with an operation and maintenance operating system in advance;
(2) capturing a target asset to be operated and maintained through an operation and maintenance auditing system, and generating an operation and maintenance URI (Uniform resource identifier) containing a target asset information ciphertext;
(3) the operation and maintenance URI starts a pre-deployed substitution filling tool and transmits the related information ciphertext of the target asset to the substitution filling tool;
(4) the substitution and filling tool analyzes the received target asset related information ciphertext, extracts related information, configures the related information in a windows registry to form session content, and then starts a Navicat client by the substitution and filling tool;
(5) the Navicat client directly pulls the target asset related information ciphertext from the Windows registry and restores the target asset related information ciphertext into the real password of the target asset related information, then the Navicat client accesses the operation and maintenance auditing system through the session content configured by the filling tool, and the operation and maintenance auditing system accesses the target asset needing operation and maintenance and forms a passage with the Navicat client.
The specific process for the operation and maintenance of the user is as follows:
and (4) logging in the operation and maintenance auditing system in the browser by an operation and maintenance worker, selecting the assets needing to be operated and maintained, and clicking the operation and maintenance.
The operation and maintenance clicking operation is captured by an operation and maintenance auditing system, and an operation and maintenance URI (Uniform Resource identifier) is generated aiming at the currently selected asset; the operation and maintenance URI comprises a starting parameter serialized in a Base64 format, and the parameter comprises an account password ciphertext of the target asset; the cipher text of the asset is calculated by adopting the same encryption algorithm as that of the Navicat client, so that the Navicat client can read the cipher text conveniently and directly; the replacement filling tool which is deployed in advance locally can be started through the URI Protocol operation and maintenance auditing system, and meanwhile, the operation and maintenance auditing system information and the ciphertext of the target asset information are transmitted to the replacement filling tool.
The fill-in tool parses the binary stream encoded by Base64 passed by the operation and maintenance auditing system. And analyzing the characters and then extracting the parameters again. Currently, parsing of multiple database parameter types is supported, including databases such as Mysql, Oracle, SQLServer, Postgresql, and the like. After the parameter analysis is finished, writing the parameter into the corresponding position of each type of database in the registry according to the Navicat session configuration format; the parameter analysis work is decoded by a Base64 decoding tool, after the binary stream is converted into characters by the decoding tool, the characters are scanned and extracted once again to confirm the database type and the parameter values thereof; when the replacement filling tool is written into the registry, if the same-name table entries exist, the replacement filling tool is firstly deleted and then the current operation and maintenance asset information is added again, so that the problem of failure of the current operation and maintenance authentication caused by old redundant information is solved; and after the completion of all the steps is detected, the replacement filling work of the operation and maintenance is completed. And the filling tool starts a Navicat client according to the path configured during deployment so as to enable an operation and maintenance worker to start operation and maintenance operation.
After the process of starting the Navicat through the filling tool is finished, the configured session content is pulled to the corresponding position in the Windows registry; the session configuration parameters at the corresponding positions in the Windows registry are prepared and generated by a substitution tool in advance, and the assets to be operated and maintained at this time can be directly pulled. The password is stored in the registry in a form of ciphertext, and as the password ciphertext sent by the operation and maintenance auditing system is encrypted in a Navicat encryption mode, the Navicat can restore the real password of the asset through an encryption and decryption module of the client. The operation and maintenance personnel cannot sense the whole encryption and decryption process; when the session configured by the filling tool is detected, the Navicat client displays the configured session content in the foreground, and the operation and maintenance staff can directly operate and maintain without any manual configuration.
The Navicat accesses the operation and maintenance auditing system through the session content configured by the filling tool, and the operation and maintenance auditing system accesses the assets to be operated and maintained to form a channel with the Navicat.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to these embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (10)
1. An automatic substitution and filling method applied to operation and maintenance audit navicat is characterized by comprising the following steps:
(1) deploying a substitution tool in a windows system with an operation and maintenance operating system in advance;
(2) capturing a target asset to be operated and maintained through an operation and maintenance auditing system, and generating an operation and maintenance URI (Uniform resource identifier) containing a target asset information ciphertext;
(3) the operation and maintenance URI starts a pre-deployed substitution filling tool and transmits the related information ciphertext of the target asset to the substitution filling tool;
(4) the substitution and filling tool analyzes the received target asset related information ciphertext, extracts related information, configures the related information in a windows registry to form session content, and then starts a Navicat client by the substitution and filling tool;
(5) the Navicat client directly pulls the target asset related information ciphertext from the Windows registry and restores the target asset related information ciphertext into the real password of the target asset related information, then the Navicat client accesses the operation and maintenance auditing system through the session content configured by the filling tool, and the operation and maintenance auditing system accesses the target asset needing operation and maintenance and forms a passage with the Navicat client.
2. The automatic filling method applied to operation audit navicat according to claim 1, in the step (1), when a filling tool is deployed in advance, firstly, the resolving capability of an operation uri in the operation audit system needs to be registered in a windows system registry of a current user.
3. The automatic substitution and filling method applied to operation and maintenance audit Navicat according to claim 2, wherein in the step (1), a substitution and filling tool deployed in advance can actively discover a Navicat client deployed on a default path, and if the substitution and filling tool fails to actively discover in a deployment process, a popup prompt is generated to prompt a user to actively specify a position of the Navicat client.
4. The automatic substitution method applied to the operation and maintenance audit navicat according to the claim 3, characterized in that in the step (1), the substitution tool deployed in advance needs to grant the right to access the registry of the windows system.
5. The automatic substitution and filling method applied to the operation and maintenance audit navicat as claimed in claim 4, wherein the target asset information ciphertext in the operation and maintenance URI in the step (2) is formed by a binary stream encoded by Base64, and the account password ciphertext of the target asset is contained therein.
6. The automatic substitution and filling method applied to the operation and maintenance audit Navicat according to claim 5, wherein the target asset information ciphertext is calculated by using the same encryption algorithm as the Navicat client.
7. The automatic filling method applied to the operation and maintenance audit navicat in the step (4), wherein the filling tool includes a Base64 decoding module and a character extracting module, the Base64 decoding module can decode the binary stream encoded by the Base64 in the operation and maintenance URI, convert it into characters, and the characters are scanned and extracted by the character extracting module, and the extracted data includes the type of the database and the parameter values of the database.
8. The automatic substitution and filling method applied to operation and maintenance audit navicat according to claim 7, wherein the extracted database type includes at least one of Mysql, Oracle, SQL Server, and Postgresql.
9. The automatic substitution and filling method applied to operation and maintenance audit navicat according to claim 8, wherein in the step (4), the extracted relevant information is configured into a windows registry, and the specific process of forming the session content is as follows: and writing the substitute filling tool into the corresponding position of each type of database in the windows registry according to the extracted database type and the parameter value of the database according to the session configuration format of the Navicat client, thereby forming the session content configured by the substitute filling tool.
10. The automatic padding method for operation and maintenance audit Navicat according to claim 9, wherein in the step (5), the session configuration parameters at the corresponding location in the Windows registry are prepared and generated by a padding tool in advance, the asset to be operated and maintained at this time can be directly pulled, the password is stored in the registry in a form of a ciphertext, and the password ciphertext sent from the operation and maintenance audit system is encrypted by using the encryption method of Navicat, so that the Navicat can restore the real password of the asset through the encryption and decryption module of the client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010500851.8A CN111651756B (en) | 2020-06-04 | 2020-06-04 | Automatic substitution and filling method applied to operation and maintenance audit navicat |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010500851.8A CN111651756B (en) | 2020-06-04 | 2020-06-04 | Automatic substitution and filling method applied to operation and maintenance audit navicat |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111651756A true CN111651756A (en) | 2020-09-11 |
CN111651756B CN111651756B (en) | 2022-05-31 |
Family
ID=72347080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010500851.8A Active CN111651756B (en) | 2020-06-04 | 2020-06-04 | Automatic substitution and filling method applied to operation and maintenance audit navicat |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111651756B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115150168A (en) * | 2022-06-30 | 2022-10-04 | 北京天融信网络安全技术有限公司 | Filling replacing method and device and electronic equipment |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110055593A1 (en) * | 2009-08-25 | 2011-03-03 | Lurey Craig B | Method and apparatus for protecting account numbers and passwords |
CN103413202A (en) * | 2013-08-21 | 2013-11-27 | 成都安恒信息技术有限公司 | Automatic authorization relation collection method applied to operation and maintenance auditing system |
US20140040855A1 (en) * | 2011-07-28 | 2014-02-06 | National Instruments Corporation | Optimization of a Data Flow Program Based on Access Pattern Information |
CN103856345A (en) * | 2012-12-06 | 2014-06-11 | 华为技术有限公司 | Server account number and password management method and system and server |
CN103973681A (en) * | 2014-04-29 | 2014-08-06 | 上海上讯信息技术股份有限公司 | Secondary-layer password on-behalf filling method and module for operation and maintenance management auditing system |
CN105139139A (en) * | 2015-08-31 | 2015-12-09 | 国家电网公司 | Data processing method, device and system for operation and maintenance audit |
CN106909826A (en) * | 2017-02-23 | 2017-06-30 | 北京天融信网络安全技术有限公司 | Password is for action and system |
WO2017127850A1 (en) * | 2016-01-24 | 2017-07-27 | Hasan Syed Kamran | Computer security based on artificial intelligence |
CN107122674A (en) * | 2017-04-12 | 2017-09-01 | 成都安恒信息技术有限公司 | A kind of access method of oracle database applied to O&M auditing system |
CN109614169A (en) * | 2018-12-29 | 2019-04-12 | 上海上讯信息技术股份有限公司 | Window client application program automatic operation method based on pixel coordinate mode |
CN110620814A (en) * | 2019-09-10 | 2019-12-27 | 西安交大捷普网络科技有限公司 | Control method and system for operation and maintenance login of Web browser |
CN110704856A (en) * | 2019-10-09 | 2020-01-17 | 成都安恒信息技术有限公司 | Secret sharing method based on operation and maintenance auditing system |
-
2020
- 2020-06-04 CN CN202010500851.8A patent/CN111651756B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110055593A1 (en) * | 2009-08-25 | 2011-03-03 | Lurey Craig B | Method and apparatus for protecting account numbers and passwords |
US20140040855A1 (en) * | 2011-07-28 | 2014-02-06 | National Instruments Corporation | Optimization of a Data Flow Program Based on Access Pattern Information |
CN103856345A (en) * | 2012-12-06 | 2014-06-11 | 华为技术有限公司 | Server account number and password management method and system and server |
CN103413202A (en) * | 2013-08-21 | 2013-11-27 | 成都安恒信息技术有限公司 | Automatic authorization relation collection method applied to operation and maintenance auditing system |
CN103973681A (en) * | 2014-04-29 | 2014-08-06 | 上海上讯信息技术股份有限公司 | Secondary-layer password on-behalf filling method and module for operation and maintenance management auditing system |
CN105139139A (en) * | 2015-08-31 | 2015-12-09 | 国家电网公司 | Data processing method, device and system for operation and maintenance audit |
WO2017127850A1 (en) * | 2016-01-24 | 2017-07-27 | Hasan Syed Kamran | Computer security based on artificial intelligence |
CN106909826A (en) * | 2017-02-23 | 2017-06-30 | 北京天融信网络安全技术有限公司 | Password is for action and system |
CN107122674A (en) * | 2017-04-12 | 2017-09-01 | 成都安恒信息技术有限公司 | A kind of access method of oracle database applied to O&M auditing system |
CN109614169A (en) * | 2018-12-29 | 2019-04-12 | 上海上讯信息技术股份有限公司 | Window client application program automatic operation method based on pixel coordinate mode |
CN110620814A (en) * | 2019-09-10 | 2019-12-27 | 西安交大捷普网络科技有限公司 | Control method and system for operation and maintenance login of Web browser |
CN110704856A (en) * | 2019-10-09 | 2020-01-17 | 成都安恒信息技术有限公司 | Secret sharing method based on operation and maintenance auditing system |
Non-Patent Citations (8)
Title |
---|
AHMET TALHA OZCAN: "BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications", 《FC2015:FINANCIAL CRYPTOGRAGHY AND DATA SECURITY》 * |
CARLOS LUEVANOS: "Analysis on the Security and Use of Password Managers", 《2017 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT)》 * |
姜婷: "基于应用虚拟化的运维审计系统的设计与实现", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 * |
安盟电子信息安全有限责任公司: "安恒运维审计与风险控制系统启用安盟身份认证系统( 堡垒机 + 身份认证系统)", 《WWW.ANMENG.COM.CN/FILEDOWNLOAD/195879》 * |
平林艳: "基于webservice的运维审计系统信息同步的应用", 《数字化应用》 * |
张飞等: "集中授权式服务器运维审计系统设计与部署", 《中国报业》 * |
海安市审计局: "巧用Navicat软件实施审计数据统一管理和大数据分析", 《HTTPS://SJJ.NANTONG.GOV.CN/NTSSJJ/YJZY/CONTENT.CBA398BC-BDFE-4A06-95F2-2AF0832F3F8E.HTML》 * |
范柯等: "黄委政务外网统一用户与访问管理的技术实现", 《办公自动化》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115150168A (en) * | 2022-06-30 | 2022-10-04 | 北京天融信网络安全技术有限公司 | Filling replacing method and device and electronic equipment |
CN115150168B (en) * | 2022-06-30 | 2023-12-01 | 北京天融信网络安全技术有限公司 | Substitution filling method and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN111651756B (en) | 2022-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5344109B1 (en) | Database encryption system, method and program | |
WO2013069770A1 (en) | Database device, method and program | |
WO2009136258A1 (en) | Method and apparatus for dump and log anonymization (dala) | |
CN110084599B (en) | Key processing method, device, equipment and storage medium | |
DE112005002955T5 (en) | Electrical transmission system in a secret environment between virtual disks and associated electrical transmission method | |
CN107483495B (en) | Big data cluster host management method, management system and server | |
CN102325026A (en) | Account password secure encryption system | |
US20130332728A1 (en) | Electronic file access control system and method | |
CN114207615A (en) | System and method for maintaining an immutable data access log with privacy | |
JP2007028015A (en) | Program, system and method for time stamp verification, and time stamp generation request method | |
CN107426223A (en) | Cloud file encryption and decryption method, encryption and decryption device and processing system | |
CN111651756B (en) | Automatic substitution and filling method applied to operation and maintenance audit navicat | |
JP6391823B2 (en) | RDP data collection apparatus and method | |
CN110598193B (en) | Audit offline document management system | |
CN103259689B (en) | A kind of method of equipment being carried out to password change and password recovery after breaking down | |
CN107370733A (en) | A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions | |
CN106529216B (en) | Software authorization system and software authorization method based on public storage platform | |
CN111988148A (en) | Automatic login equipment and method based on biological authentication | |
CN110968881A (en) | System authentication and data encryption method based on artificial intelligence | |
CN115347675A (en) | Smart power grid data secure access method and system | |
CN111489462A (en) | Personal Bluetooth key system | |
CN113315629B (en) | Cloud storage and verification system for business passwords | |
CN109788249B (en) | Video monitoring control method based on industrial internet operating system | |
CN113127841A (en) | Method, device, equipment and storage medium for remotely managing software user | |
CN106453273A (en) | Cloud technology based information security management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |