CN113037774B - Security management method, device, equipment and machine readable storage medium - Google Patents

Security management method, device, equipment and machine readable storage medium Download PDF

Info

Publication number
CN113037774B
CN113037774B CN202110347669.8A CN202110347669A CN113037774B CN 113037774 B CN113037774 B CN 113037774B CN 202110347669 A CN202110347669 A CN 202110347669A CN 113037774 B CN113037774 B CN 113037774B
Authority
CN
China
Prior art keywords
security
association rule
executing
safety
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110347669.8A
Other languages
Chinese (zh)
Other versions
CN113037774A (en
Inventor
李刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Security Technologies Co Ltd
Original Assignee
New H3C Security Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Security Technologies Co Ltd filed Critical New H3C Security Technologies Co Ltd
Priority to CN202110347669.8A priority Critical patent/CN113037774B/en
Publication of CN113037774A publication Critical patent/CN113037774A/en
Application granted granted Critical
Publication of CN113037774B publication Critical patent/CN113037774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The present disclosure provides a security management method, apparatus, device and machine-readable storage medium, the method comprising: acquiring associated characteristic information according to the triggered security event; matching a pre-configured association rule according to the characteristic information; executing corresponding safety management actions according to the matching result; the security management action comprises executing a security script associated with an association rule; the security scenario includes at least one security protection operation. According to the technical scheme, association rules are configured in advance according to the characteristics of various safety events, and the safety scenario associated with the association rules is selected at the same time, wherein the safety scenario comprises one or more safety protection operations, when the safety events are triggered, corresponding safety management actions are executed according to the matching result of the safety events and the association rules, and the safety management actions comprise the execution of the safety scenario associated with the association rules, so that each association rule does not need to be configured in detail, and the configuration amount is reduced.

Description

Security management method, device, equipment and machine readable storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a security management method, apparatus, device, and machine-readable storage medium.
Background
The internet provides great convenience for our life, but brings convenience and also generates a lot of risks, such as brute force cracking, external network scanning detection, malformed messages, internal network scanning attack, malicious URL events, malicious delivery programs and the like. How to effectively detect the security event and rapidly and accurately process the security event is important for maintaining network security and guaranteeing equipment and property security. The security event response linkage function requires operation and maintenance personnel to carry out strategy configuration on the association rule, so that the work tasks of the operation and maintenance personnel are greatly increased, and the work efficiency of the system is reduced.
Disclosure of Invention
In view of the above, the present disclosure provides a security management method, a security management apparatus, an electronic device, and a machine-readable storage medium to solve the problem of excessive configuration of the security event association rule.
The specific technical scheme is as follows:
the present disclosure provides a security management method, applied to a security management device, the method including: acquiring associated characteristic information according to the triggered security event; matching a pre-configured association rule according to the characteristic information; executing corresponding safety management actions according to the matching result; the security management action comprises executing a security script associated with an association rule; the security scenario includes at least one security protection operation.
As a technical solution, the executing a corresponding security management action according to the matching result includes: if the association rule matched with the characteristic information exists, executing a safety script associated with the association rule; and feeding back an execution result.
As a technical solution, if there is a failure in the fed back result of executing the security protection operation, the security scenario associated with the association rule is re-executed, or an instruction for re-executing the security scenario associated with the association rule is responded.
As a technical solution, the security management action further includes, in response to a manual orchestration configuration, executing a security protection operation; and executing corresponding safety management actions according to the matching result, wherein the actions comprise: and if the association rule matched with the characteristic information does not exist or the association rule matched with the characteristic information and/or the associated security script are not enabled, responding to manual arrangement configuration and executing security protection operation.
The present disclosure also provides a security management device, which is applied to a security management device, the device includes: the characteristic module is used for acquiring associated characteristic information according to the triggered security event; the matching module is used for matching the pre-configured association rule according to the characteristic information; the execution module is used for executing corresponding safety management actions according to the matching result; the security management action comprises executing a security script associated with an association rule; the security scenario includes at least one security protection operation.
As a technical solution, the executing a corresponding security management action according to the matching result includes: if the association rule matched with the characteristic information exists, executing a safety script associated with the association rule; and feeding back an execution result.
As a technical solution, if there is a failure in the fed back result of executing the security protection operation, the security scenario associated with the association rule is re-executed, or an instruction for re-executing the security scenario associated with the association rule is responded.
As a technical solution, the security management action further includes, in response to a manual orchestration configuration, executing a security protection operation; and executing corresponding safety management actions according to the matching result, wherein the actions comprise: and if the association rule matched with the characteristic information does not exist or the association rule matched with the characteristic information and/or the associated security script are not enabled, responding to manual arrangement configuration and executing security protection operation.
The present disclosure also provides an electronic device, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions capable of being executed by the processor, and the processor executes the machine-executable instructions to implement the foregoing security management method.
The present disclosure also provides a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the aforementioned security management method.
The technical scheme provided by the disclosure at least brings the following beneficial effects:
the association rules are configured in advance according to the characteristics of various safety events, and the safety scenario associated with the association rules is selected at the same time, wherein the safety scenario comprises one or more safety protection operations, when the safety events are triggered, corresponding safety management actions are executed according to the matching result of the safety events and the association rules, and the safety management actions comprise the execution of the safety scenario associated with the association rules, so that the detailed configuration of each association rule is not needed, and the configuration amount is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments of the present disclosure or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present disclosure, and other drawings can be obtained by those skilled in the art according to the drawings of the embodiments of the present disclosure.
FIG. 1 is a flow diagram of a security management method in one embodiment of the present disclosure;
FIG. 2 is a block diagram of a security management device in one embodiment of the present disclosure;
fig. 3 is a hardware configuration diagram of an electronic device in an embodiment of the present disclosure.
Detailed Description
The terminology used in the embodiments of the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein is meant to encompass any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information in the embodiments of the present disclosure, such information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. Depending on the context, moreover, the word "if" as used may be interpreted as "at … …" or "when … …" or "in response to a determination".
In view of the above, the present disclosure provides a security management method, a security management apparatus, an electronic device, and a machine-readable storage medium to solve the problem of excessive configuration of the security event association rule.
Specifically, the technical scheme is as follows.
In one embodiment, the present disclosure provides a security management method applied to a security management device, the method including: acquiring associated characteristic information according to the triggered security event; matching a pre-configured association rule according to the characteristic information; executing corresponding safety management actions according to the matching result; the security management action comprises executing a security script associated with an association rule; the security scenario includes at least one security protection operation.
Specifically, as shown in fig. 1, the method comprises the following steps:
and step S11, acquiring the associated characteristic information according to the triggered safety event.
And step S12, matching the pre-configured association rule according to the characteristic information.
And step S13, executing corresponding safety management action according to the matching result.
Wherein the security management action comprises executing a security scenario associated with the association rule, the security scenario comprising at least one security protection operation.
The association rules are configured in advance according to the characteristics of various safety events, and the safety scenario associated with the association rules is selected at the same time, wherein the safety scenario comprises one or more safety protection operations, when the safety events are triggered, corresponding safety management actions are executed according to the matching result of the safety events and the association rules, and the safety management actions comprise the execution of the safety scenario associated with the association rules, so that the detailed configuration of each association rule is not needed, and the configuration amount is reduced.
In one embodiment, the performing, according to the matching result, a corresponding security management action includes: if the association rule matched with the characteristic information exists, executing a safety script associated with the association rule; and feeding back an execution result.
In one embodiment, the security scenario associated with the association rule is re-executed or the instruction to re-execute the security scenario associated with the association rule is responded to if there is a failure in the fed back result of executing the security protection operation.
In one embodiment, the security management actions further include, in response to a manual orchestration configuration, performing a security protection operation; and executing corresponding safety management actions according to the matching result, wherein the actions comprise: and if the association rule matched with the characteristic information does not exist or the association rule matched with the characteristic information and/or the associated security script are not enabled, responding to manual arrangement configuration and executing security protection operation.
The system predefines a plurality of predefined cases, such as five predefined cases and predefined scenarios corresponding to the predefined cases, only operation and maintenance personnel are required to start the cases, the scenarios are started to be automatically executed, the action parameters of the scenarios are modified, when a safety event occurs, the configured association rules can be matched with the corresponding cases, the cases are configured with corresponding safety scenarios, and the scenario preset action of the hit case is executed aiming at the safety event, so that the management operation is carried out on the related safety event.
And if the security event is not matched with the predefined association rule and the associated case or the self-defined case and the corresponding security script are not in the effective state, responding to manual arrangement execution of the user through a security event page, and selecting the script to perform corresponding script action execution.
The user can newly add cases, select association rules and related parameters, newly add scripts and configure script action parameters according to the requirements of the operating network environment, so that the security events can hit the self-defined cases, and script actions, namely security protection operation, are executed. The script actions can be equipment blacklist, access control, alarm notification, work order processing, whole network host scanning, alarm reminding, virus checking and killing, virus isolation, process checking and killing, host isolation, user offline, user blacklist, and other appropriate safety protection actions can also be added according to the needs.
The characteristic information includes the reliability of the defect, the severity level of the event, the type of the event, and other suitable information characteristics.
After the system detects that a security event has occurred. And matching the association rule, judging whether the association rule configures a case or not, and if the case is not configured, manually arranging and configuring. Otherwise, whether the case is enabled or not is judged, and if the case is in the disabled state, manual arrangement and configuration are needed. Otherwise, the script is automatically executed or the action of the script is manually executed. And inquiring the script execution state according to the feedback information, judging whether an action failed to be executed exists, and if the action failed to be executed does not exist, directly ending the process. Otherwise, judging whether to re-issue the action with execution failure, and if not, ending the process. Otherwise, the failed action is executed again, and the execution result is returned. And repeating the query of the script execution state and the corresponding steps after the script execution state again until the process is finished after the script execution is finished.
In an embodiment, the present disclosure also provides a security management apparatus, as shown in fig. 2, applied to a security management device, the apparatus including: the characteristic module 21 is used for acquiring associated characteristic information according to the triggered security event; the matching module 22 is used for matching the pre-configured association rule according to the characteristic information; the execution module 23 is configured to execute a corresponding security management action according to the matching result; the security management action comprises executing a security script associated with an association rule; the security scenario includes at least one security protection operation.
In one embodiment, the performing, according to the matching result, a corresponding security management action includes: if the association rule matched with the characteristic information exists, executing a safety script associated with the association rule; and feeding back an execution result.
In one embodiment, the security scenario associated with the association rule is re-executed or the instruction to re-execute the security scenario associated with the association rule is responded to if there is a failure in the fed back result of executing the security protection operation.
In one embodiment, the security management actions further include, in response to a manual orchestration configuration, performing a security protection operation; and executing corresponding safety management actions according to the matching result, wherein the actions comprise: and if the association rule matched with the characteristic information does not exist or the association rule matched with the characteristic information and/or the associated security script are not enabled, responding to manual arrangement configuration and executing security protection operation.
The device embodiments are the same or similar to the corresponding method embodiments and are not described herein again.
In an embodiment, the present disclosure provides an electronic device, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions capable of being executed by the processor, and the processor executes the machine-executable instructions to implement the foregoing security management method, and from a hardware level, a hardware architecture diagram may be as shown in fig. 3.
In one embodiment, the present disclosure provides a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the aforementioned security management method.
Here, a machine-readable storage medium may be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and so forth. For example, the machine-readable storage medium may be: a RAM (random Access Memory), a volatile Memory, a non-volatile Memory, a flash Memory, a storage drive (e.g., a hard drive), a solid state drive, any type of storage disk (e.g., an optical disk, a dvd, etc.), or similar storage medium, or a combination thereof.
The systems, devices, modules or units described in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more software and/or hardware implementations in practicing the disclosure.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Furthermore, these computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (which may include, but is not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an embodiment of the present disclosure, and is not intended to limit the present disclosure. Various modifications and variations of this disclosure will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included in the scope of the claims of the present disclosure.

Claims (10)

1. A security management method is applied to a security management device, and comprises the following steps:
acquiring associated characteristic information according to the triggered security event;
matching a pre-configured association rule according to the characteristic information;
executing corresponding safety management actions according to the matching result;
the security management action comprises executing a security script associated with an association rule;
the security scenario includes at least one security protection operation.
2. The method according to claim 1, wherein the performing the corresponding security management action according to the matching result comprises:
if the association rule matched with the characteristic information exists, executing a security script associated with the association rule;
and feeding back an execution result.
3. The method of claim 2,
and if the fed back result of executing the safety protection operation has failure, re-executing the safety scenario associated with the association rule, or responding to the instruction of re-executing the safety scenario associated with the association rule.
4. The method of claim 1, wherein the security management action further comprises, in response to a manual orchestration configuration, performing a security guard operation;
and executing corresponding safety management actions according to the matching result, wherein the actions comprise:
and if the association rule matched with the characteristic information does not exist or the association rule matched with the characteristic information and/or the associated security script are not enabled, responding to manual arrangement configuration and executing security protection operation.
5. A security management apparatus, applied to a security management device, the apparatus comprising:
the characteristic module is used for acquiring associated characteristic information according to the triggered security event;
the matching module is used for matching the pre-configured association rule according to the characteristic information;
the execution module is used for executing corresponding safety management actions according to the matching result;
the security management action comprises executing a security script associated with an association rule;
the security scenario includes at least one security protection operation.
6. The apparatus of claim 5, wherein the performing the corresponding security management action according to the matching result comprises:
if the association rule matched with the characteristic information exists, executing a safety script associated with the association rule;
and feeding back an execution result.
7. The apparatus of claim 6,
and if the fed back result of executing the safety protection operation has failure, re-executing the safety scenario associated with the association rule, or responding to the instruction of re-executing the safety scenario associated with the association rule.
8. The apparatus of claim 5, wherein the security management action further comprises, in response to a manual orchestration configuration, performing a security guard operation;
and executing corresponding safety management actions according to the matching result, wherein the actions comprise:
and if the association rule matched with the characteristic information does not exist or the association rule matched with the characteristic information and/or the associated security script are not enabled, responding to manual arrangement configuration and executing security protection operation.
9. An electronic device, comprising: a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor to perform the method of any one of claims 1 to 4.
10. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of any of claims 1-4.
CN202110347669.8A 2021-03-31 2021-03-31 Security management method, device, equipment and machine readable storage medium Active CN113037774B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110347669.8A CN113037774B (en) 2021-03-31 2021-03-31 Security management method, device, equipment and machine readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110347669.8A CN113037774B (en) 2021-03-31 2021-03-31 Security management method, device, equipment and machine readable storage medium

Publications (2)

Publication Number Publication Date
CN113037774A CN113037774A (en) 2021-06-25
CN113037774B true CN113037774B (en) 2022-05-27

Family

ID=76453100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110347669.8A Active CN113037774B (en) 2021-03-31 2021-03-31 Security management method, device, equipment and machine readable storage medium

Country Status (1)

Country Link
CN (1) CN113037774B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113468212A (en) * 2021-07-21 2021-10-01 华青融天(北京)软件股份有限公司 Event execution method and device and electronic equipment
CN114157495B (en) * 2021-12-06 2024-04-19 杭州安恒信息安全技术有限公司 Secure network scenario arrangement method, apparatus, device and readable storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8789175B2 (en) * 2010-09-30 2014-07-22 Verizon Patent And Licensing Inc. Device security system
CN105791264A (en) * 2016-01-08 2016-07-20 国家电网公司 Network security pre-warning method
US11012472B2 (en) * 2018-12-05 2021-05-18 International Business Machines Corporation Security rule generation based on cognitive and industry analysis
CN112422484B (en) * 2019-08-23 2023-03-17 华为技术有限公司 Method, apparatus, and storage medium for determining scenario for processing security event
CN110545276B (en) * 2019-09-03 2022-06-21 新华三信息安全技术有限公司 Threat event warning method and device, warning equipment and machine-readable storage medium
CN111818069B (en) * 2020-07-14 2022-07-15 绿盟科技集团股份有限公司 Method, device, medium and computer equipment for presenting security event processing flow
CN111818068B (en) * 2020-07-14 2022-07-15 绿盟科技集团股份有限公司 Editing verification method, device, medium and computer equipment for micro-scene case
CN111885064B (en) * 2020-07-24 2022-11-25 杭州安恒信息安全技术有限公司 Security event analysis method and device based on multi-source data, electronic device and storage medium
CN112529417A (en) * 2020-12-14 2021-03-19 杭州安恒信息技术股份有限公司 Security event processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113037774A (en) 2021-06-25

Similar Documents

Publication Publication Date Title
CN113037774B (en) Security management method, device, equipment and machine readable storage medium
US9280664B2 (en) Apparatus and method for blocking activity of malware
EP3142011B9 (en) Anomaly recovery method for virtual machine in distributed environment
US10831622B2 (en) Method and apparatus for processing gateway device fault
US20180060568A1 (en) System And Method Of Dynamically Updating Stack Canaries
EP3439237A1 (en) Exception monitoring and alarming method and device
CN102262574A (en) Boot protecting method and device of operating system
CN108845916B (en) Platform monitoring and alarming method, device, equipment and computer readable storage medium
CN112995236A (en) Internet of things equipment safety management and control method, device and system
CN110471780B (en) Distributed event processing apparatus, terminal, and computer storage medium
US7694179B2 (en) Suspected place identifying apparatus and processing method
CN114363008B (en) Virtual device authentication method and device, electronic device and storage medium
CN105005726A (en) Control method and device for menu item
CA2961695A1 (en) Correlation-based detection of exploit activity
CN114003904A (en) Information sharing method, device, computer equipment and storage medium
CN113704037A (en) Equipment testing method and device, computer equipment and storage medium
CN111046377B (en) Method and device for loading dynamic link library, electronic equipment and storage medium
CN103679024A (en) Virus treating method and device
CN108008800B (en) Reset request processing method, device and equipment
CN105740028A (en) Access control method and device
CN114020356B (en) Method and device for safely closing service
CN111131198B (en) Updating method and device for network security policy configuration
CN114553562A (en) Security management method, device, equipment and machine readable storage medium
US20180046810A1 (en) Application integrity verification in multi-tier architectures
CN110188539B (en) Method, device and system for running application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant