CN113961292B - Security product generation method and device, electronic equipment and storage medium - Google Patents

Security product generation method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113961292B
CN113961292B CN202111230731.1A CN202111230731A CN113961292B CN 113961292 B CN113961292 B CN 113961292B CN 202111230731 A CN202111230731 A CN 202111230731A CN 113961292 B CN113961292 B CN 113961292B
Authority
CN
China
Prior art keywords
product
module
security
security product
customized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111230731.1A
Other languages
Chinese (zh)
Other versions
CN113961292A (en
Inventor
李金冰
董晓齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Antiy Technology Group Co Ltd
Original Assignee
Antiy Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Antiy Technology Group Co Ltd filed Critical Antiy Technology Group Co Ltd
Priority to CN202111230731.1A priority Critical patent/CN113961292B/en
Publication of CN113961292A publication Critical patent/CN113961292A/en
Application granted granted Critical
Publication of CN113961292B publication Critical patent/CN113961292B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/04Manufacturing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Manufacturing & Machinery (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a method and a device for generating a security product, electronic equipment and a storage medium, and relates to the technical field of network security. The invention aims to solve the problem that a safety product cannot be provided quickly according to the demands of users. The security product generation method comprises the following steps: displaying a product configuration interface; at least two product module identifiers are displayed on the product configuration interface; receiving a security product generation instruction; selecting at least part of the at least two product module identifications based on the security product generation instruction; based on the selected product module identification, a customized security product is generated. The method is suitable for quickly generating the security product meeting the user demand.

Description

Security product generation method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of network security. And more particularly, to a security product generation method, apparatus, electronic device, and storage medium.
Background
The security product is a product for protecting various information security in a network or local to a computer, and comprises a majority of basic security configurations, and only a small part of security configurations need to be customized according to the actual application scene and the requirements of users. However, the existing method for generating the security product generally only regenerates a set of basic security product based on the original product, and develops the basic security product according to the customized requirement of the user. In this process, a large number of front-end and back-end development efforts are involved, which are repeated with the previous development process, both increasing the workload of the developer and increasing the time to provide the user with a secure product that meets the requirements.
Disclosure of Invention
In view of this, the embodiments of the present invention provide a method, an apparatus, an electronic device, and a storage medium for generating a security product, which can quickly provide the security product according to the user's needs.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical scheme:
in a first aspect, an embodiment of the present invention provides a method for generating a security product, including: displaying a product configuration interface; at least two product module identifiers are displayed on the product configuration interface; receiving a security product generation instruction; selecting at least part of the at least two product module identifications based on the security product generation instruction; based on the selected product module identification, a customized security product is generated.
According to a specific implementation manner of the embodiment of the present invention, the generating a customized security product based on the selected product module identifier includes: based on the selected product module identification, downloading the corresponding product module from the product library to the local; the downloaded product modules are inserted into a locally pre-generated security product system framework to generate a customized security product. According to a specific implementation manner of the embodiment of the present invention, the downloading, based on the selected product module identifier, the corresponding product module from the product library to the local area includes: based on the selected product module identification, downloading front-end codes and back-end codes of corresponding product modules from a product library to a local place; wherein the inserting the downloaded product modules into a locally pre-generated security product system framework generates a customized security product, comprising: and respectively inserting the front end code and the back end code of the downloaded product module into a locally pre-generated security product system frame to generate a customized security product.
According to a specific implementation of an embodiment of the present invention, before generating the customized security product based on the selected product module identification, the method further includes: downloading the security product application framework and the public module from the product library to the local; and inserting the public module into the security product application framework to generate a security product system framework.
According to a specific implementation manner of the embodiment of the invention, before the product configuration interface is displayed, the method further comprises: generating a customized security product module based on user requirements; and adding the customized security product module into the product library.
According to a specific implementation manner of the embodiment of the present invention, the generating a customized security product module based on the user requirement includes: downloading the security product item locally; authenticating the operation request of the security product item; after passing the authentication, a new product module is added and/or modified in the secure product item is received.
In a second aspect, an embodiment of the present invention provides a security product generating apparatus, including: the interface display unit is used for displaying a product configuration interface; at least two product module identifiers are displayed on the product configuration interface; the instruction receiving unit is used for receiving the security product generation instruction; a module selection unit, configured to select at least part of the product module identifiers from the at least two product module identifiers based on the security product generation instruction; and the product generating unit is used for generating customized safety products based on the selected product module identification. According to a specific implementation manner of the embodiment of the present invention, the product generating unit includes: the first downloading module is used for downloading the corresponding product module from the product library to the local based on the selected product module identifier; and the first generation module is used for inserting the downloaded product module into a locally pre-generated security product system frame to generate a customized security product.
According to a specific implementation manner of the embodiment of the present invention, the first downloading module is specifically configured to download, from a product library, a front end code and a back end code of a corresponding product module to a local area based on the selected product module identifier; the first generation module is specifically configured to insert the front end code and the back end code of the downloaded product module into a locally pre-generated security product system frame, respectively, to generate a customized security product.
According to a specific implementation of an embodiment of the present invention, the product generating unit further includes: a second download module for downloading the security product application framework and the public module from the product library to a local location before the first generation module generates the customized security product based on the selected product module identification; and the second generation module is used for inserting the public module into the security product application framework to generate a security product system framework. According to a specific implementation manner of the embodiment of the invention, the product module generating unit is further used for generating a customized security product module based on user requirements before the product configuration interface is displayed, and adding the generated customized security product module into the product library.
According to a specific implementation manner of the embodiment of the present invention, the product module generating unit includes: a third download module for downloading the security product item to the local; the operation authentication module is used for authenticating the operation request of the safety product item; and the product generation module is used for accepting adding and/or modifying new product modules in the safe product item after the operation request of the operation authentication module on the safe product item passes the authentication.
In a third aspect, an embodiment of the present invention provides an electronic device, including: the device comprises a shell, a processor, a storage, a circuit board and a power circuit, wherein the circuit board is arranged in a space surrounded by the shell, and the processor and the storage are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the storage for performing the security product generation method according to any one of the first aspects.
In a fourth aspect, embodiments of the present invention provide a computer-readable storage medium storing one or more programs executable by one or more processors to implement the security product generation method of any of the first aspects.
Compared with the original product, the method, the device, the electronic equipment and the storage medium for generating the security product, which are provided by the embodiment of the invention, regenerates a set of basic security products for development.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for generating a security product according to an embodiment of the present invention;
FIG. 2 is a block diagram of a security product generation device according to an embodiment of the present invention;
fig. 3 is a block diagram of an electronic device according to an embodiment of the invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a method for generating a security product according to an embodiment of the present invention includes:
s01, displaying a product configuration interface; at least two product module identifiers are displayed on the display product configuration interface.
The display product configuration interface can be an interface on a display screen of the terminal device, such as an interface on a display screen of a desktop computer; it can be understood that each product module identifier corresponds to one product module, and each product module corresponds to some security configurations, wherein some security configurations can be one security configuration or two or more security configurations.
In this way, by selecting different product module identifiers in the display product configuration interface, the selection of different security configurations is equivalent, so that security products with different security levels can be built.
A security product refers to a product that secures various information in a network or local to a computer, including but not limited to user information, page data, confidential information, and the like. Network security products are products that prevent such information from being attacked by hazards such as phishing, web (World Wide Web) vulnerabilities, horse hanging, and the like.
Configuring the security product refers to configuring corresponding functions according to specific security requirements of users, such as security level requirements or security protection requirements, and generating the security product with customized functions by one key.
S02, receiving a security product generation instruction.
Specifically, for the purpose of conveniently and quickly issuing a security product generation instruction, the receiving the security product generation instruction includes: and receiving clicking operation of a one-key generation button of the product displayed on the product configuration interface.
The product configuration interface is provided with at least a product module identifier and a product one-key generation button, and clicking operations can be respectively carried out on the product module identifier and the product one-key generation button on the product configuration interface. Thus, after the selection operation of the product module identifier is completed, the security product generation instruction can be issued by clicking the product one-key generation button.
S03, selecting at least part of the at least two product module identifiers based on the security product generation instruction.
S04, generating a customized security product based on the selected product module identification.
To provide the user with his or her desired security product faster, in one embodiment, the generating a customized security product based on the selected product module identification includes: based on the selected product module identification, downloading the corresponding product module from the product library to the local; the downloaded product modules are inserted into a locally pre-generated security product system framework to generate a customized security product.
It can be understood that the product modules in the product library correspond to the product module identifiers on the product configuration interface one by one; the security product system frame is adapted for each security product.
In the case of current security products, the security products generally include a basic security configuration and a customized security configuration developed according to different user-specific needs. In this embodiment, the product modules in the product library include a first product module corresponding to the basic security configuration and a second product module corresponding to the customized security configuration, where the second product module has a broad application scenario. That is, the product modules in the product library expand as the received user demand increases. Thus, with expansion in the product library, when customized security configuration requirements of some users are received, security products meeting the requirements of the users can be directly generated, so that the users can be provided with the required security products more quickly.
In addition, the safety product modules are placed in the product library, so that centralized management of the safety product modules is facilitated. However, it should be noted that, since the product library may be expanded with the increase of the received user demands, the system may be too huge, so that the product library may be cleaned periodically based on the demands, and the cleaned content may be product modules that are not used for a preset period of time and/or customized product modules that are no longer cooperated with the user.
Further, in order to quickly expand the product library, in an embodiment, the downloading, based on the selected product module identifier, the corresponding product module from the product library to the local area includes: based on the selected product module identification, downloading front-end codes and back-end codes of corresponding product modules from a product library to a local place; wherein inserting the downloaded product module into a locally pre-generated security product system framework generates a customized security product, comprising: and respectively inserting the front end code and the back end code of the downloaded product module into a locally pre-generated security product system frame to generate a customized security product.
The front end code and the back end code of the product module are separated, so that the working efficiency of developers can be improved, and the product library can be rapidly expanded. In addition, since the front end code and the back end code of the product module are separated, the downloaded front end code and back end code need to be inserted into the security product system frame respectively, and then the foreground and the background logic are realized through the mutual calling between the front end code and the corresponding back end code, so as to generate the customized security product.
Compared with the method that a set of basic security products are regenerated for development on the basis of original products, the method provided by the embodiment of the invention has the advantages that the product module identifiers corresponding to the requirements of users are selected in the display product configuration interface, and then the security products are generated according to the security product generation instruction issued by the selection operation, so that the required security products can be provided for the users more quickly.
Further, when the product module identifier corresponding to the user requirement is lacking in the display product configuration interface, development can be performed on the lacking product module, and then the product module identifier is added into the display product configuration interface to generate a safety product according to the steps, so that the workload of a developer can be reduced, and the required safety product can be provided for the user more quickly.
For example, during the same time period, ten users purchase security products, eight of which have basic security configuration requirements and the basic security configuration requirements of which have different security level requirements, two of which have customized security configuration requirements. By adopting the method, the eight user security products with basic security configuration requirements can be generated by one key respectively, corresponding product modules are developed according to the customized security configuration requirements of the two remaining users, and then the product modules are added into a product library, and then the two user security products with customized security configuration requirements are generated by one key respectively. And, when other users have the same customized security configuration requirement, the security product with the customized security configuration requirement can be directly generated by one key.
In one embodiment, prior to generating the customized security product based on the selected product module identification, the method further comprises: downloading the security product application framework and the public module from the product library to the local; and inserting the public module into the security product application framework to generate a security product system framework.
Alternatively, the generated security product system frame may be stored in a product library, such that the security product system frame may be downloaded directly to the local site in the product library prior to generating the customized security product based on the security product generation instructions and the selected product module identification.
In an embodiment, before displaying the product configuration interface, the method further comprises: generating a customized security product module based on user requirements; and adding the customized security product module into the product library.
The user requirements may have different security levels based on the security requirements, actual application scenarios, etc., and then customized security product modules are generated based on the user requirements of the different security levels and added to the product library.
Further, before generating the customized security product module, application universality analysis needs to be performed on corresponding user requirements, if the corresponding user requirements have application universality, the customized security product module is generated, and the generated customized security product module is added into the product library. In this way, by adding the security product modules corresponding to the extensive customization needs to the product library, the corresponding security product modules can be selected directly in the display product configuration interface when the same customization needs are met, thereby providing the user with the required security products more quickly.
In addition, the product library is provided with security product modules generated according to the user requirements of different security levels, so that the generated security products have different security levels in different defense aspects, an attacker cannot determine the threat defense capability of the target security product in advance through analysis of the security products generated by the method, and the generated security products still have higher threat defense capability although adopting a modularized generation mode.
In one embodiment, the generating a customized security product module based on user requirements includes: downloading the security product item locally; authenticating the operation request of the security product item; after passing the authentication, it is accepted to add and/or modify new product modules in the secure product item.
Specifically, the operation request for the security product item is authenticated by the local mac address (Media Access Control Address) to be bound to the security product item, or by SSH (Secure Shell) key of the security product item.
It should be noted that, with the authentication scheme in this embodiment, an emergency situation may be caused, and a situation that the authority of the personnel is insufficient is solved.
Further, the authentication result may include at least two types, and in one example, the security product item is divided into a core item and a non-core item, and after passing the authentication, the entire security product item may be modified if it is confirmed that there is a first authority, and the non-core item may be modified if it is confirmed that there is a second authority. Therefore, through the accurate control of the core project, which can be also called as the core code, the read-write of a specific project is controlled according to the authority, the accuracy, the safety and the stability of the core project can be ensured, other expansion functions can adopt the same authentication limit, and the authority is issued, so that the stability of the core code is ensured, and the rapid expansion of a product library can be ensured.
Example two
Referring to fig. 2, an embodiment of the present invention provides a security product generating apparatus, including: an interface display unit 201, configured to display a product configuration interface; at least two product module identifiers are displayed on the product configuration interface; an instruction receiving unit 203 for receiving a security product generation instruction; a module selection unit 202, configured to select at least part of the at least two product module identifiers based on the security product generation instruction; the product generating unit 204 is configured to generate a customized security product based on the selected product module identifier.
The product module identifiers displayed in the interface display unit 201 can be threat information online quick query module identifiers, multi-source heterogeneous information aggregation module identifiers, interactive multi-dimensional deep analysis module identifiers, threat information retrieval and sharing module identifiers, advanced threat monitoring capability module identifiers and the like.
Compared with the method of firstly generating a security product frame and then developing the security product frame according to the user requirements, the security product generating device provided by the embodiment of the invention can provide the security product required by the user more quickly by firstly selecting the product module identifier corresponding to the user requirements through the interface display unit 201 and respectively transmitting the selection operation received by the module selection unit 202 and the security product generating instruction received by the instruction receiving unit to the product generating unit 204.
In an embodiment, the product generation unit 204 includes: the first downloading unit is used for downloading the corresponding product module from the product library to the local place based on the selected product module identification; and the first generation module is used for inserting the downloaded product module into a locally pre-generated security product system frame to generate a customized security product.
In the case of current security products, the security products generally include a basic security configuration and a customized security configuration developed according to different users. In this embodiment, the product modules in the product library include a first product module corresponding to the basic security configuration and a second product module corresponding to the customized security configuration of different users with application universality, that is, the product modules in the product library may be expanded with increasing received user demands. Thus, with expansion in the product library, when customized security configuration requirements of some users are received, security products meeting the requirements of the users can be directly generated, so that the users can be provided with the required security products more quickly.
Wherein the product library may be set in Git.
In an embodiment, the first downloading module is specifically configured to download, from the product library, the front end code and the back end code of the corresponding product module to the local area based on the selected product module identifier; the first generation module is specifically configured to insert the front end code and the back end code of the downloaded product module into a locally pre-generated security product system frame, respectively, to generate a customized security product.
The front end code and the back end code of the product module are separated, so that the working efficiency of developers can be improved, and the product library can be rapidly expanded. In addition, since the front end code and the back end code of the product module are separated, the front end code and the back end code downloaded by the first download module need to be inserted into the security product system frame through the first generation module respectively, and then the foreground logic and the background logic are realized through the mutual calling between the front end code and the corresponding back end code, so that the customized security product is generated.
In an embodiment, the product generation unit 204 further comprises: a second download module for downloading the security product framework and the public module from the product library to a local location before the first generation module generates the customized security product based on the selected product module identification; and the second generation module is used for inserting the public module into the security product application framework to generate a security product system framework.
Optionally, the product generation unit 204 may include a third download module for downloading the security product system frame from the product library before the first generation module generates the customized security product based on the selected product module identification.
In an embodiment, the security product generating device further comprises a product module generating unit, configured to generate a customized security product module based on the user requirement before displaying the product configuration interface, and add the generated customized security product module to the product library.
Generally, the customized security product module can generally meet the requirements of encrypting the generated information file, storing the generated information file to a designated location, and the like according to the requirements of changing the display mode by user configuration.
It will be appreciated that the product module generation unit may also generate the product module and the common module described above corresponding to the underlying security configuration.
In an embodiment, the product module generating unit includes: a fourth downloading module for downloading the security product item to the local; the operation authentication module is used for authenticating the operation request of the safety product item; and the product generation module is used for accepting adding and/or modifying new product modules in the safe product item after the operation request of the operation authentication module on the safe product item passes the authentication.
Specifically, the operation authentication module authenticates the operation request of the security product item by a local mac address (Media Access Control Address) previously bound to the security product item, or by SSH (Secure Shell) key of the security product item.
Example III
Referring to fig. 3, an embodiment of the present invention provides an electronic device including: the device comprises a shell 301, a processor 302, a memory 303, a circuit board 304 and a power circuit 305, wherein the circuit board 304 is arranged in a space surrounded by the shell 301, and the processor 302 and the memory 303 are arranged on the circuit board 304; a power supply circuit 305 for supplying power to the respective circuits or devices of the above-described electronic apparatus; the memory 303 is used for storing executable program codes; the processor 302 executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for executing the security product generation method according to any one of the first embodiment.
Example IV
An embodiment of the present invention provides a computer storage medium storing one or more programs executable by one or more processors to implement the security product generation method according to any one of the embodiments.
Compared with the original product, the method, the device, the electronic equipment and the storage medium for generating the security product, which are provided by the embodiment of the invention, regenerates a set of basic security products for development.
Specifically, by storing the security product modules in the product library, centralized management of the security product modules is facilitated. Through the operation authentication module, the development authority of a developer can be limited, and the quick expansion of a product library is ensured while the stability of a core code is ensured. Through the mutual coordination among the interface display unit, the module selection unit, the instruction receiving unit and the product generation unit, the security product module and the security product system frame corresponding to the user demand can be downloaded from the product library, the security product is generated, and the security product required by the user can be provided for the user more quickly.
It should be noted that, in this document, emphasis on the solutions described between the embodiments is different, but there is a certain interrelation between the embodiments, and when understanding the solution of the present invention, the embodiments may refer to each other; additionally, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present invention should be included in the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (10)

1. A method of generating a security product, comprising:
displaying a product configuration interface; at least two product module identifiers are displayed on the product configuration interface;
receiving a security product generation instruction;
selecting at least part of the at least two product module identifications based on the security product generation instruction;
generating a customized security product based on the selected product module identification;
the generating a customized security product based on the selected product module identification includes:
based on the selected product module identification, downloading the corresponding product module from the product library to the local; the product module corresponds to a safety configuration, wherein the safety configuration is one safety configuration or more than two safety configurations;
inserting the downloaded product module into a locally pre-generated security product system frame to generate a customized security product;
based on the selected product module identification, downloading the corresponding product module from the product library to the local area comprises the following steps:
based on the selected product module identification, downloading front-end codes and back-end codes of corresponding product modules from a product library to a local place;
wherein the inserting the downloaded product modules into a locally pre-generated security product system framework generates a customized security product, comprising:
and respectively inserting the front end code and the back end code of the downloaded product module into a locally pre-generated security product system frame to generate a customized security product.
2. The security product generation method of claim 1, wherein prior to generating the customized security product based on the selected product module identification, the method further comprises:
downloading the security product application framework and the public module from the product library to the local;
and inserting the public module into the security product application framework to generate a security product system framework.
3. The security product generation method of claim 1, wherein prior to displaying the product configuration interface, the method further comprises:
generating a customized security product module based on user requirements;
and adding the customized security product module into the product library.
4. A security product generation method according to claim 3, wherein the generating a customized security product module based on user demand comprises:
downloading the security product item locally;
authenticating the operation request of the security product item;
after passing the authentication, it is accepted to add and/or modify new product modules in the secure product item.
5. A security product generating apparatus, comprising:
the interface display unit is used for displaying a product configuration interface; at least two product module identifiers are displayed on the product configuration interface;
the instruction receiving unit is used for receiving the security product generation instruction;
a module selection unit, configured to select at least part of the product module identifiers from the at least two product module identifiers based on the security product generation instruction;
the product generating unit is used for generating customized safety products based on the selected product module identifiers;
the product generation unit includes:
the first downloading module is used for downloading the corresponding product module from the product library to the local based on the selected product module identifier; the product module corresponds to a safety configuration, wherein the safety configuration is one safety configuration or more than two safety configurations;
the first generation module is used for inserting the downloaded product module into a locally pre-generated security product system frame to generate a customized security product;
the first downloading module is specifically configured to download, from the product library, a front end code and a back end code of a corresponding product module to a local area based on the selected product module identifier;
the first generation module is specifically configured to insert the front end code and the back end code of the downloaded product module into a locally pre-generated security product system frame, respectively, to generate a customized security product.
6. The security product generating apparatus according to claim 5, wherein the product generating unit further comprises:
a second download module for downloading the security product application framework and the public module from the product library to a local location before the first generation module generates the customized security product based on the selected product module identification;
and the second generation module is used for inserting the public module into the security product application framework to generate a security product system framework.
7. The security product generating apparatus of claim 5, further comprising: and the product module generating unit is used for generating a customized safety product module based on the user requirement before the product configuration interface is displayed, and adding the generated customized safety product module into the product library.
8. The security product generation apparatus of claim 7, wherein the product module generation unit comprises:
a third download module for downloading the security product item to the local;
the operation authentication module is used for authenticating the operation request of the safety product item;
and the product generation module is used for accepting adding and/or modifying new product modules in the safe product item after the operation request of the operation authentication module on the safe product item passes the authentication.
9. An electronic device, the electronic device comprising: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space surrounded by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; a processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the security product generation method of any of the preceding claims 1-4.
10. A computer-readable storage medium, wherein the computer-readable storage medium stores one or more programs executable by one or more processors to implement the security product generation method of any of claims 1-4.
CN202111230731.1A 2021-10-21 2021-10-21 Security product generation method and device, electronic equipment and storage medium Active CN113961292B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111230731.1A CN113961292B (en) 2021-10-21 2021-10-21 Security product generation method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111230731.1A CN113961292B (en) 2021-10-21 2021-10-21 Security product generation method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113961292A CN113961292A (en) 2022-01-21
CN113961292B true CN113961292B (en) 2024-03-26

Family

ID=79466011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111230731.1A Active CN113961292B (en) 2021-10-21 2021-10-21 Security product generation method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113961292B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1309349A (en) * 2001-03-22 2001-08-22 北京北大天正科技发展有限公司 Method for on-line customization of software
CN102195987A (en) * 2011-05-31 2011-09-21 成都七巧软件有限责任公司 Distributed credibility authentication method and system thereof based on software product library
CN103176769A (en) * 2011-12-20 2013-06-26 阿里巴巴集团控股有限公司 Customizable software deployment, installation method and system
CN105373390A (en) * 2015-12-03 2016-03-02 北京小鸟科技发展有限责任公司 OEM-oriented online software customization packaging release method and apparatus
CN107688464A (en) * 2017-06-28 2018-02-13 上海壹账通金融科技有限公司 Software customized server, method and computer-readable recording medium
CN108829378A (en) * 2018-05-24 2018-11-16 北京顺丰同城科技有限公司 A kind of development approach of application software, device and electronic equipment
CN110244977A (en) * 2019-05-21 2019-09-17 深圳壹账通智能科技有限公司 Customized software generation method, system, electronic equipment and storage medium
CN111538481A (en) * 2019-01-21 2020-08-14 北京邮电大学 Application program customization method and system
CN112765503A (en) * 2021-01-18 2021-05-07 中国工商银行股份有限公司 Static processing method and device for page loading data
CN113094028A (en) * 2021-04-29 2021-07-09 成都星云智联科技有限公司 Windows desktop program development framework, method and related components
CN113407882A (en) * 2021-06-15 2021-09-17 北京房江湖科技有限公司 Component generation method and device, computer-readable storage medium and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9811839B2 (en) * 2014-04-30 2017-11-07 Sap Se Multiple CRM loyalty interface framework

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1309349A (en) * 2001-03-22 2001-08-22 北京北大天正科技发展有限公司 Method for on-line customization of software
CN102195987A (en) * 2011-05-31 2011-09-21 成都七巧软件有限责任公司 Distributed credibility authentication method and system thereof based on software product library
CN103176769A (en) * 2011-12-20 2013-06-26 阿里巴巴集团控股有限公司 Customizable software deployment, installation method and system
CN105373390A (en) * 2015-12-03 2016-03-02 北京小鸟科技发展有限责任公司 OEM-oriented online software customization packaging release method and apparatus
CN107688464A (en) * 2017-06-28 2018-02-13 上海壹账通金融科技有限公司 Software customized server, method and computer-readable recording medium
CN108829378A (en) * 2018-05-24 2018-11-16 北京顺丰同城科技有限公司 A kind of development approach of application software, device and electronic equipment
CN111538481A (en) * 2019-01-21 2020-08-14 北京邮电大学 Application program customization method and system
CN110244977A (en) * 2019-05-21 2019-09-17 深圳壹账通智能科技有限公司 Customized software generation method, system, electronic equipment and storage medium
CN112765503A (en) * 2021-01-18 2021-05-07 中国工商银行股份有限公司 Static processing method and device for page loading data
CN113094028A (en) * 2021-04-29 2021-07-09 成都星云智联科技有限公司 Windows desktop program development framework, method and related components
CN113407882A (en) * 2021-06-15 2021-09-17 北京房江湖科技有限公司 Component generation method and device, computer-readable storage medium and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于JavaScript框架的混合应用开发技术;姜艳;;网络新媒体技术;20160715(第04期);59-64 *
基于混合架构安卓移动学习系统设计与实现;张志元;;电脑编程技巧与维护;20130718(第14期);142-144 *

Also Published As

Publication number Publication date
CN113961292A (en) 2022-01-21

Similar Documents

Publication Publication Date Title
CN109743315B (en) Behavior identification method, behavior identification device, behavior identification equipment and readable storage medium for website
CN111143869B (en) Application package processing method and device, electronic equipment and storage medium
Li et al. Security attack analysis using attack patterns
KR102080156B1 (en) Auto Recharge System, Method and Server
CN102664874B (en) A kind of method and system for secure logging in
CN104200140A (en) Method and device providing verification code
CN112036125B (en) Document management method and device and computer equipment
CN111679893A (en) Operation system construction method and device, electronic equipment and storage medium
CN111641678A (en) Task scheduling method and device, electronic equipment and medium
CN109409033A (en) Code encryption method, apparatus, computer installation and storage medium
CN111475803A (en) Background authority management system and management method
CN108737444A (en) Micro services authorization management method and device applied to intelligent robot
WO2014117595A1 (en) Method and device for determining propagation relationship of trojan horse files
CN113961292B (en) Security product generation method and device, electronic equipment and storage medium
CN112632596B (en) Data processing method, device, storage medium and terminal
CN110532783A (en) Data tamper resistant method, device, equipment and storage medium
CN108667647B (en) Method and device for setting device parameters and server
CN114024978A (en) Cloud resource synchronization method, device, node and storage medium
CN117009931A (en) Watermarking and watermarking application methods, devices, equipment and storage medium
CN113761478B (en) Authorization method and device for software product
CN115525578A (en) Form generation method and device, electronic equipment and storage medium
CN109871708A (en) Data transmission method, device, electronic equipment and storage medium
CN114666140A (en) Method, device, computer equipment and medium for accessing form
CN113792323A (en) Sensitive data encryption method and device based on agricultural products and electronic equipment
CN115018509A (en) Object processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant