CN111857869A - Application information configuration method and device - Google Patents

Application information configuration method and device Download PDF

Info

Publication number
CN111857869A
CN111857869A CN202010615567.5A CN202010615567A CN111857869A CN 111857869 A CN111857869 A CN 111857869A CN 202010615567 A CN202010615567 A CN 202010615567A CN 111857869 A CN111857869 A CN 111857869A
Authority
CN
China
Prior art keywords
configuration
program
configuration file
application program
target application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010615567.5A
Other languages
Chinese (zh)
Inventor
戚永峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haier Uplus Intelligent Technology Beijing Co Ltd
Original Assignee
Haier Uplus Intelligent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haier Uplus Intelligent Technology Beijing Co Ltd filed Critical Haier Uplus Intelligent Technology Beijing Co Ltd
Priority to CN202010615567.5A priority Critical patent/CN111857869A/en
Publication of CN111857869A publication Critical patent/CN111857869A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an application information configuration method and device, wherein the method comprises the following steps: the framework program locates the corresponding secret configuration file according to the user type, wherein the user type comprises one of the following: production users, general users; the framework program acquires a sensitive information identifier of application configuration from an application configuration file of a target application program to be started; the framework program acquires a configuration item corresponding to the sensitive information identifier from the confidential configuration file and exports the configuration item as an environment variable of the target application program; and the framework program starts the target application program according to the application configuration file and transmits the environment variable to the target application program. According to the invention, the framework program is positioned to different confidential configuration files to transmit the sensitive information to the application program, so that the effect of improving the security of the application information is achieved.

Description

Application information configuration method and device
Technical Field
The invention relates to the field of application configuration, in particular to an application information configuration method and device.
Background
Many applications require some sensitive information to be configured, such as database link addresses and ports, user names, passwords, etc. It is common practice in the prior art to write this information into the configuration file of the program. However, this method has a great problem in safety and ease of use. First, all people exposed to the program and code can see the sensitive information, which is very unsafe. Secondly, for the development environment and the production environment to run, if the information is different, the program or the configuration needs to be modified when the program is online. Thirdly, when a plurality of applications use the same account information, if the account information is changed, all programs or configurations of related applications need to be modified, and the workload is large and errors are prone to occur.
Disclosure of Invention
The embodiment of the invention provides an application information configuration method and device, which are used for at least solving the problem of insecurity caused by easy leakage of sensitive information in a configuration file of an application program in the related art.
According to an embodiment of the present invention, there is provided an application information configuration method including: the framework program locates the corresponding secret configuration file according to the user type, wherein the user type comprises one of the following: production users, general users; the framework program acquires a sensitive information identifier of application configuration from an application configuration file of a target application program to be started; the framework program acquires a configuration item corresponding to the sensitive information identifier from the confidential configuration file and exports the configuration item as an environment variable of the target application program; and the framework program starts the target application program according to the application configuration file and transmits the environment variable to the target application program.
Optionally, before the framework program locates the corresponding secret configuration file according to the user type, the framework program further includes: and configuring corresponding secret configuration files according to different user types, wherein the secret configuration files of different user types have the same configuration format.
Optionally, configuring the corresponding secret configuration file according to different user types includes: configuring the confidential configuration files of the production users by a system administrator, wherein the confidential configuration files of all the production users are managed in a centralized way and set the authority to be readable only for the production users; and configuring the secret configuration file of the user by the common user, wherein the configuration file is stored in the user directory of the user and the authority is set to be visible only by the user.
Further, the framework program starts the target application program according to the application configuration file and transfers the environment variable to the target application program, including: and the framework program starts the target application program according to the application program type and the path configured in the application configuration file, and sets the permission of the environment variable to be visible to the target application program.
Optionally, after the framework program starts the target application program according to the application configuration file and transfers the environment variable to the target application program, the method includes: and the target application program refers to the corresponding environment variable in the running process.
Optionally, the sensitive information is identified as globally unique.
Optionally, wherein the sensitive information comprises at least one of: account number, password, data type, data address.
According to another embodiment of the present invention, there is provided an application information configuring apparatus including: a positioning module, configured to position a corresponding secret configuration file according to a user type, where the user type includes one of: production users, general users; the first acquisition module is used for acquiring the sensitive information identifier of the application configuration from the application configuration file of the target application program to be started; the second acquisition module is used for acquiring a configuration item corresponding to the sensitive information identifier from the confidential configuration file and exporting the configuration item as the environment variable of the target application program; and the starting module is used for starting the target application program according to the application configuration file and transmitting the environment variable to the target application program.
According to a further embodiment of the present invention, there is also provided a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the embodiment of the invention, the framework program is positioned to the corresponding confidential configuration file according to different user types, so that the sensitive information in the application configuration is transmitted to the application program, the problem of insecurity caused by easy leakage of the sensitive information in the configuration file of the application program in the related technology can be solved, and the effect of improving the safety of the application information is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow chart of an application information configuration method according to an embodiment of the present invention;
FIG. 2 is a flow diagram of an application information configuration method in accordance with an alternative embodiment of the present invention;
fig. 3 is a block diagram of an application information configuring apparatus according to an alternative embodiment of the present invention;
FIG. 4 is a configuration format diagram of a secret configuration file according to an embodiment of the present invention;
fig. 5 is a flowchart of a method for application account configuration according to an alternative embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In order to better understand the technical solutions of the embodiments and the alternative embodiments of the present invention, the following description is made on possible application scenarios in the embodiments and the alternative embodiments of the present invention, but is not limited to the application of the following scenarios.
Example 1
In this embodiment, a method for configuring application information is provided, and fig. 1 is a flowchart of an application information configuring method according to an embodiment of the present invention, as shown in fig. 1, the flowchart includes the following steps:
step S102, the framework program locates the corresponding secret configuration file according to the user type, wherein the user type comprises one of the following: production users, general users;
step S104, the frame program obtains the sensitive information identification of the application configuration from the application configuration file of the target application program to be started;
step S106, the framework program acquires a configuration item corresponding to the sensitive information identifier from the confidential configuration file and exports the configuration item as an environment variable of the target application program;
step S108, the framework program starts the target application program according to the application configuration file and transmits the environment variable to the target application program.
Before step S102 in this embodiment, the method may further include: and configuring corresponding secret configuration files according to different user types, wherein the secret configuration files of different user types have the same configuration format.
In this embodiment, step S102 may include: configuring the confidential configuration files of the production users by a system administrator, wherein the confidential configuration files of all the production users are managed in a centralized way and set the authority to be readable only for the production users; and configuring the secret configuration file of the user by the common user, wherein the configuration file is stored in the user directory of the user and the authority is set to be visible only by the user.
In this embodiment, the sensitive information identifier may be globally unique.
In this embodiment, the sensitive information may include at least one of: account number, password, data type, data address.
Through the steps, the framework program positions the corresponding confidential configuration files according to different user types, so that the problem that the api of the central configuration server is called in the application and the application intrusiveness is overlarge in a manner of using a centralized configuration server to manage configuration in the related art can be solved, and the effect of improving the application information safety is achieved.
Fig. 2 is a flowchart of an application information configuration method according to an alternative embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
step S201, configuring corresponding secret configuration files according to different user types, wherein the secret configuration files of different user types have the same configuration format;
step S202, the framework program locates the corresponding secret configuration file according to the user type, wherein the user type comprises one of the following: production users, general users;
step S203, the framework program acquires the sensitive information identifier of the application configuration from the application configuration file of the target application program to be started;
step S204, the framework program acquires a configuration item corresponding to the sensitive information identifier from the confidential configuration file and exports the configuration item as an environment variable of the target application program;
step S205, the framework program starts the target application program according to the application program type and the path configured in the application configuration file, and sets the permission of the environment variable to be visible to the target application program;
step S206, the target application program refers to the corresponding environment variable in the running process.
Through the steps, the configuration formats of the confidential configuration files of different user types are the same, so that the problem that a single central configuration server cannot be communicated when a plurality of environments are physically isolated from each other by using a centralized configuration server management configuration mode in the related art can be solved, and the effects of improving the usability and efficiency of application information are achieved.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 2
In this embodiment, an application information configuration apparatus is further provided, and the apparatus is used to implement the foregoing embodiments and preferred embodiments, and the description already made is omitted for brevity. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 3 is a block diagram of an application information configuration apparatus according to an alternative embodiment of the present invention, as shown in fig. 3, the apparatus includes a positioning module 10, a first obtaining module 20, a second obtaining module 30, and an initiating module 40.
A positioning module 10, configured to position a corresponding secret configuration file according to a user type, where the user type includes one of: production users, general users;
a first obtaining module 20, configured to obtain a sensitive information identifier of an application configuration from an application configuration file of a target application program to be started;
a second obtaining module 30, configured to obtain a configuration item corresponding to the sensitive information identifier from the secret configuration file, and export the configuration item as an environment variable of the target application program;
and the starting module 40 is configured to start the target application program according to the application configuration file, and transmit the environment variable to the target application program.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Example 3
In order to facilitate understanding of the technical solutions provided by the present invention, the following detailed description will be made with reference to embodiments of specific scenarios.
For the same application needing to configure sensitive information (such as account password), the application can be operated in different environments, such as a development environment and a production environment. And in different environments, the account information of the external service used by the application is different. Even in a development environment, account password information of external services used by different users is different.
In the related technical scheme, a centralized configuration server is used, for example, apollo, all information such as account numbers and passwords is stored on a central server, and the application uses the configuration of different environments by transmitting different starting parameters.
The way of managing the configuration using a centralized configuration server has several disadvantages: firstly, the api of a central configuration server needs to be called in an application, and the application intrusiveness is too large; secondly, some applications such as shell, hive sql, etc. are very inconvenient or not applicable at all; finally, when multiple environments are physically isolated from each other, a single central configuration server cannot be connected.
The scheme includes a framework program and a secret configuration file. The framework program reads the application configuration and starts the actual application. The secret profiles vary from user to user, but are in the same format.
The information used by the production user is configured by a system administrator. The configuration used by the ordinary user configures itself. For the production user (group), the confidential configuration file is managed in a centralized mode, the authority is set, only the production user (group) can read the confidential configuration file, and other users cannot read and write the confidential configuration file. For other users, the confidential configuration file is placed in a user directory, and the user configures the confidential configuration file according to a set format, wherein the authority is only visible for the user.
One application profile is provided for each application. The configuration file contains the code number of sensitive information needed by the application to be run, such as (my _ usr _ db _ rw). The sensitive information code number is uniformly distributed by system management to ensure global uniqueness.
Sensitive information is acquired by using appointed environment variables in the application program, such as: username, password, dburl, etc.
When the framework program is started, determining which secret configuration file is used according to the current user (group), analyzing which sensitive information codes are used in application configuration, finding configuration items corresponding to the sensitive information codes from the secret configuration file, and exporting (export) the configuration items to environment variables, wherein the exported environment variables are only visible in the session (including the application program which is started later).
The framework can launch the application.
The technology related to the scheme comprises users (groups), environment variables and file reading and writing permissions under linux. The protocol has been successfully implemented on linux.
FIG. 4 is a diagram of a configuration format of a secret configuration file according to an embodiment of the present invention, and for the secret configuration file format shown in FIG. 4, the sensitive information code number is in the row 1 square brackets. The 2 nd behavior confidential data type may be a database type, and the like. Lines 3, 4, and 5 are the sensitive data address, account number, and password, respectively. Possibly also included, the example is not fully listed. In addition, this example demonstrates the configuration of the mysql database.
Fig. 5 is a flowchart of a method for configuring an application account according to an alternative embodiment of the present invention, and as shown in fig. 5, the flowchart includes the following steps:
in step S501, the framework program serves as an entry of the program. The user starts the framework program with the application configuration as a parameter.
In step S502, the framework determines which confidential profile to use based on the current user (group). If it is a production user, a confidential profile is located. If the user is other user, go to the user ($ home) directory to find the user's own secret configuration file.
In step S503, the framework analyzes which sensitive information codes are used in the application configuration. The sensitive information code numbers are uniformly distributed by a system administrator. If the application does not need to be on-line, the developer can assign and add or modify the confidential configuration file under the home according to the appointed format.
Step S504, the framework program finds out the corresponding item, namely account information, from the confidential configuration file located in step S502 according to the sensitive information code. The (export) environment variables are then set. Such as: export username 1, etc.
In step S505, the application is started. And starting the application program according to the application program type and the path configured in the application configuration. Thus, the environment variable set in step S504 is visible to the application.
In step S506, the application uses the account information. The application can use information such as account number and password by referring to the relevant environment variables set in step S505.
The key point of the embodiment of the invention is that the framework program uses different confidential configuration files according to different users or user groups. Different environment variables are set (derived) according to different users or user groups and different applications. Sensitive information is conveyed by setting different environment variables to applications of different users or groups of users.
Therefore, the embodiment of the invention has the advantages that:
first, data security is improved. Different users only see the confidential information (account number, password and the like) configured by the users, so that the safety is improved;
second, configuration security is improved. Confidential information is not hard-coded in an application program code or a configuration file by a developer, so that the confidential information can be effectively prevented from being leaked;
further, the ease of use is improved. The same code and configuration can be operated in different environments without modification, so that the usability is improved;
finally, efficiency is improved. If the production account information is changed, a system administrator can adjust the production secret configuration file, and the application program does not need to make any change, so that the efficiency is high.
Example 4
Embodiments of the present invention also provide a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, the framework program locates the corresponding secret configuration file according to the user type, wherein the user type comprises one of the following: production users, general users;
S2, the framework program obtains the sensitive information mark of the application configuration from the application configuration file of the target application program to be started;
s3, the framework program acquires the configuration item corresponding to the sensitive information identification from the confidential configuration file and exports the configuration item as the environment variable of the target application program;
and S4, the framework program starts the target application program according to the application configuration file and transmits the environment variable to the target application program.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Example 5
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, the framework program locates the corresponding secret configuration file according to the user type, wherein the user type comprises one of the following: production users, general users;
s2, the framework program obtains the sensitive information mark of the application configuration from the application configuration file of the target application program to be started;
s3, the framework program acquires the configuration item corresponding to the sensitive information identification from the confidential configuration file and exports the configuration item as the environment variable of the target application program;
and S4, the framework program starts the target application program according to the application configuration file and transmits the environment variable to the target application program.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An application information configuration method, comprising:
the framework program locates the corresponding secret configuration file according to the user type, wherein the user type comprises one of the following: production users, general users;
the framework program acquires a sensitive information identifier of application configuration from an application configuration file of a target application program to be started;
the framework program acquires a configuration item corresponding to the sensitive information identifier from the confidential configuration file and exports the configuration item as an environment variable of the target application program;
and the framework program starts the target application program according to the application configuration file and transmits the environment variable to the target application program.
2. The method of claim 1, wherein the framework program, before locating the corresponding confidential configuration file according to the user type, further comprises:
And configuring corresponding secret configuration files according to different user types, wherein the secret configuration files of different user types have the same configuration format.
3. The method of claim 2, wherein configuring the corresponding secret configuration file according to different user types comprises:
configuring the confidential configuration files of the production users by a system administrator, wherein the confidential configuration files of all the production users are managed in a centralized way and set the authority to be readable only for the production users;
and configuring the secret configuration file of the user by the common user, wherein the configuration file is stored in the user directory of the user and the authority is set to be visible only by the user.
4. The method of claim 1, wherein the framework program launches the target application program according to the application configuration file and passes the environment variable to the target application program, comprising:
and the framework program starts the target application program according to the application program type and the path configured in the application configuration file, and sets the permission of the environment variable to be visible to the target application program.
5. The method of claim 1, wherein after the framework program starts the target application program according to the application configuration file and passes the environment variable to the target application program, the method comprises:
And the target application program refers to the corresponding environment variable in the running process.
6. The method of claim 1, wherein the sensitive information identifier is configured to be globally unique.
7. The method of claim 1, wherein the sensitive information comprises at least one of: account number, password, data type, data address.
8. An application information configuration apparatus, comprising:
a positioning module, configured to position a corresponding secret configuration file according to a user type, where the user type includes one of: production users, general users;
the first acquisition module is used for acquiring the sensitive information identifier of the application configuration from the application configuration file of the target application program to be started;
the second acquisition module is used for acquiring a configuration item corresponding to the sensitive information identifier from the confidential configuration file and exporting the configuration item as the environment variable of the target application program;
and the starting module is used for starting the target application program according to the application configuration file and transmitting the environment variable to the target application program.
9. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is arranged to perform the method of any of claims 1 to 7 when executed.
10. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and wherein the processor is arranged to execute the computer program to perform the method of any of claims 1 to 7.
CN202010615567.5A 2020-06-30 2020-06-30 Application information configuration method and device Pending CN111857869A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010615567.5A CN111857869A (en) 2020-06-30 2020-06-30 Application information configuration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010615567.5A CN111857869A (en) 2020-06-30 2020-06-30 Application information configuration method and device

Publications (1)

Publication Number Publication Date
CN111857869A true CN111857869A (en) 2020-10-30

Family

ID=72989230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010615567.5A Pending CN111857869A (en) 2020-06-30 2020-06-30 Application information configuration method and device

Country Status (1)

Country Link
CN (1) CN111857869A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6128730A (en) * 1997-12-29 2000-10-03 Bull Hn Information Systems Inc. Method and apparatus for multilevel software configuration having administrator and software driven override limiting capabilities
US10013560B1 (en) * 2017-04-05 2018-07-03 International Business Machines Corporation Securely exchanging information during application startup
US20180276410A1 (en) * 2017-03-21 2018-09-27 O.C. Tanner Company System and Method for Providing Secure Access to Production Files in a Code Deployment Environment
CN109460670A (en) * 2018-09-26 2019-03-12 中国平安人寿保险股份有限公司 Configuration item decryption method, device, computer equipment and storage medium
CN110704863A (en) * 2019-08-23 2020-01-17 深圳市随手科技有限公司 Configuration information processing method and device, computer equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6128730A (en) * 1997-12-29 2000-10-03 Bull Hn Information Systems Inc. Method and apparatus for multilevel software configuration having administrator and software driven override limiting capabilities
US20180276410A1 (en) * 2017-03-21 2018-09-27 O.C. Tanner Company System and Method for Providing Secure Access to Production Files in a Code Deployment Environment
US10013560B1 (en) * 2017-04-05 2018-07-03 International Business Machines Corporation Securely exchanging information during application startup
CN109460670A (en) * 2018-09-26 2019-03-12 中国平安人寿保险股份有限公司 Configuration item decryption method, device, computer equipment and storage medium
CN110704863A (en) * 2019-08-23 2020-01-17 深圳市随手科技有限公司 Configuration information processing method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107733922B (en) Method and apparatus for invoking a service
CN111935110B (en) Method and device for controlling permission of tenant to access container instance
CN108427649B (en) Access management method, terminal device, system and storage medium of USB interface
CN113849808B (en) Container security management method, system, terminal and storage medium
US11588681B2 (en) Migration of managed devices to utilize management platform features
US9130923B2 (en) Credential provider that encapsulates other credential providers
JP6923582B2 (en) Information processing equipment, information processing methods, and programs
CN110324344B (en) Account information authentication method and device
CN111177776A (en) Multi-tenant data isolation method and system
CN111353136B (en) Method and device for processing operation request
CN104036194A (en) Vulnerability detection method and device for revealing private data in application program
KR20220152222A (en) Security management of devices
CN111259364A (en) Method, device, equipment and storage medium for using national secret encryption card
CN106936660B (en) Data acquisition method and device
CN112650954B (en) Block chain data sharing method, device, equipment and storage medium
CN108319821A (en) A kind of software activation method and device
CN111857869A (en) Application information configuration method and device
CN113312669B (en) Password synchronization method, device and storage medium
US20200220902A1 (en) Machine policy configuration for managed devices
CN112583890B (en) Message pushing method and device based on enterprise office system and computer equipment
CN111447080B (en) Private network decentralization control method, device and computer readable storage medium
CN113792275A (en) Password updating method and device, storage medium and electronic equipment
CN109492376B (en) Device access authority control method and device and bastion machine
CN108200013B (en) Cloud-based remote security access method, device and system
CN112231377A (en) Data mapping method, system, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination