CN114595436A - Tool application authorization method and device, electronic equipment and storage medium - Google Patents
Tool application authorization method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114595436A CN114595436A CN202210227325.8A CN202210227325A CN114595436A CN 114595436 A CN114595436 A CN 114595436A CN 202210227325 A CN202210227325 A CN 202210227325A CN 114595436 A CN114595436 A CN 114595436A
- Authority
- CN
- China
- Prior art keywords
- authorization
- tool
- computer
- information
- detecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method and a device for authorizing a tool application, an electronic device and a storage medium, wherein the method for authorizing the tool application comprises the steps of firstly obtaining tool application information; wherein the information includes a type, an authorization date, and an applicant; then judging whether the information meets the authorization condition according to the information and a pre-configured authorization white list; finally, if the judgment result is that the authorization condition is met, the tool is authorized and an authorization file is issued; the invention does not need to establish the evaluation task and then carry out the tool authorization application operation, can reduce a large number of tool authorization operations of a tool authorization unit, saves a large amount of working time, and can prevent illegal use of tools.
Description
Technical Field
The invention relates to the field of computers, in particular to a method and a device for authorizing tool application, electronic equipment and a storage medium.
Background
The prior art is to independently apply for tools and needs related personnel to manually check and verify operations; and the method is not used by any supervision tool after the auditing is passed.
Disclosure of Invention
The invention provides a method and a device for authorizing tool application, electronic equipment and a storage medium; the evaluation task is not required to be established first and then the tool authorization application operation is not required to be carried out, so that a large number of tool authorization operations of a tool authorization unit can be reduced, a large amount of working time can be saved, and meanwhile, the tools can be prevented from being illegally used.
In a first aspect, an embodiment of the present invention provides a method for applying for authorization by a tool, where the method includes:
acquiring tool application information; wherein the information includes a type, an authorization date, and an applicant;
judging whether the information meets the authorization condition or not according to the information and a pre-configured authorization white list;
and if the judgment result is that the authorization condition is met, applying for authorization to the tool and issuing an authorization file.
Optionally, the authorization method further includes:
and if the judgment result is that the authorization condition is not met, prompting that the authorization fails and feeding back reasons or manually authorizing.
Optionally, the authorization method further comprises detecting whether the computer using the authorized tool is used legally.
Optionally, the detecting the computer using the authorized tool to determine whether the computer is used legally includes machine code detection, where the machine code detection includes:
acquiring a computer MAC address, a hard disk and a CPU serial number in a tool record; the computer MAC address, the hard disk and the CPU serial number are encrypted when the tool is used for the first time and recorded in the tool;
and matching the computer MAC address, the hard disk and the CPU serial number with the current computer hardware data to judge whether the tool is used legally.
Optionally, the detecting the computer using the authorized tool to determine whether the computer is used legally includes network time detection, where the network time detection includes:
acquiring the time when the tool equipment is used;
and matching the acquired time with the tool authorization time to judge whether the acquired time is within the authorization time.
Optionally, the detecting whether the computer using the authorized tool is used legally includes using a tool staff name detecting, where the using the tool staff name detecting includes:
acquiring an input tool user name;
and matching the name of the tool user with the name of the applicant when the tool is applied to judge whether the tool user name and the applicant name are consistent.
In a second aspect, an embodiment of the present invention provides a tool application authorization apparatus, including:
the acquisition module acquires tool application information; wherein the information includes a type, an authorization date, and an applicant;
the judging module judges whether the information accords with the authorization condition or not according to the information and a pre-configured authorization white list;
and the authorization module applies for authorization to the tool and issues an authorization file if the judgment result is that the authorization condition is met.
Optionally, the authorization apparatus further comprises
And the legality detection module is used for detecting and judging whether the computer using the authorized tool is used legally.
In a third aspect, an embodiment of the present invention provides an electronic device, including a memory and a processor, where the memory stores a computer program thereon, and the processor implements the method according to any one of the first aspect when executing the program.
In a fourth aspect, an embodiment of the invention provides a computer-readable storage medium on which is stored a computer program which, when executed by a processor, implements the method of any one of the first aspects.
Advantageous effects
The invention provides a method and a device for authorizing tool application, electronic equipment and a storage medium, wherein the authorization method comprises the steps of firstly obtaining tool application information; wherein the information includes a type, an authorization date, and an applicant; then judging whether the information meets the authorization condition according to the information and a pre-configured authorization white list; finally, if the judgment result is that the authorization condition is met, the tool is authorized and an authorization file is issued; according to the technical scheme, the evaluation task does not need to be established first, and then the tool authorization application operation does not need to be performed, so that a large number of tool authorization operations of a tool authorization unit can be reduced, a large amount of working time can be saved, and meanwhile, tools can be prevented from being used illegally.
It should be understood that the statements herein reciting aspects are not intended to limit the critical or essential features of any embodiment of the invention, nor are they intended to limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of various embodiments of the present invention will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, the same or similar reference numerals denote the same or similar elements.
FIG. 1 illustrates a flow chart of a method of tool application authorization of an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a tool application authorization apparatus according to an embodiment of the present invention;
fig. 3 shows a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in one or more embodiments of the present disclosure, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
It should be noted that, the description of the embodiment of the present invention is only for clearly illustrating the technical solutions of the embodiment of the present invention, and does not limit the technical solutions provided by the embodiment of the present invention.
FIG. 1 illustrates a flow chart of a method of tool application authorization of an embodiment of the present invention; referring to fig. 1, the authorization method includes:
s20, acquiring tool application information; wherein the information includes a type, an authorization date, and an applicant;
specifically, when an evaluation task is created, an authorization application of a corresponding tool needs to be submitted, wherein the application information comprises a tool type, an authorization date and an applicant; before the application is authorized, the information of the current tool application needs to be acquired if the authorization condition is met.
S40, judging whether the authorization condition is met according to the information and a pre-configured authorization white list;
specifically, an instrument authorization unit carries out automatic auditing operation according to the instrument type, authorization date and applicant, and the submitted authorization application meets the authorization requirement, namely, the authorization is successfully automatically authorized and an authorization file is issued; if the submitted authorization application does not meet the authorization requirement, the automatic authorization fails to feed back the specific reason or the authorization is carried out manually.
The automatic auditing is a processing mode of pre-configuring an authorization white list at the early stage of an instrument authorization unit, configuring automatic auditing requirements and non-compliance requirements, and the processing mode comprises failure in configuring automatic authorization and feedback of reasons or manual approval.
The concept of the white list corresponds to the "black list", for example: in a computer system, a plurality of software are applied to a black and white list rule, an operating system, a firewall, antivirus software, a mail system, application software and the like, and the black and white list rule is almost applied in all aspects related to control; after the blacklist is enabled, the users (or IP addresses, IP packets, mails, viruses, etc.) listed in the blacklist cannot pass through, if the white list is set up, the users (or IP addresses, IP packets, mails, etc.) in the white list will preferentially pass through and will not be rejected as spam mails, the security and the rapidity are greatly improved, the meaning of the users is expanded by one step, and then the white list function corresponds to the application of the blacklist function, for example: in an operation system, if a certain user number is listed in a black list, the user number may not enjoy a certain service or all services, and the users in the white list may not be limited by the rules of the system for common users;
by identifying whether processes or files in a system have approved properties, common process names, file names, publisher names, digital signatures, whitelisting techniques enable enterprises to approve which processes are allowed to run on a particular system; some vendor products include only executable files, while others include scripts and macros, and may block more extensive files; among them, an increasingly popular white list approach is called "application control," which focuses exclusively on managing the behavior of endpoint applications;
the distinction between white and black lists includes: the white list is a user which can pass through the setting, the users except the white list can not pass through the setting, the black list is a user which can not pass through the setting, and the users except the black list can pass through the setting, so that the white list is more than the users limited by the black list under the general condition;
advantages of the white list include: the techniques may be resistant to zero-day malware and targeted attacks because by default, any unauthorized software, tools, and processes cannot run on the endpoint. If malware attempts to install at a whitelisted enabled endpoint, the whitelisting technique may determine that this is not a trusted process and deny its operating rights;
if the enterprise does not want to use the white list to prevent installation of processes, the enterprise can also use it to provide alerts, such as when a user inadvertently or unintentionally installs a malicious program or file, the white list can detect such policy violations and alert the relevant team that an unauthorized process is running in the system, allowing security personnel to take immediate action;
white-listing can improve user work efficiency and keep the system operating at optimal performance. For example, help desk support personnel may receive user complaints about slow or unpredictable behavior of the system, and after investigation, the staff may find that spyware has silently entered the endpoint, engulfed memory and processor power consumption, using a white list to detect unauthorized programs and alert the staff to another use case, rather than completely preventing it by default;
the white list may provide full visibility into the system with respect to running applications, tools, and processes, and this data may be used to track the path of an attacker if the same unauthorized program attempts to run at multiple endpoints;
the white list can help to resist advanced memory injection attacks; the technique provides functionality to verify all approved processes running in memory and ensure that these processes are not modified at run time, thereby defending against advanced memory exploits;
advanced attacks typically involve the manipulation of legitimate applications. White list products may identify and issue alerts when such advanced attacks involve memory violations, suspicious process behavior, configuration changes, or operating system tampering.
S60, if the judgment result is that the tool accords with the authorization condition, applying for authorization to the tool and issuing an authorization file;
authorizing the tool application in accordance through matching the white list and the application information, and prompting the authorization failure and feeding back reasons or manually authorizing if the tool application in accordance with the authorization condition is not satisfied.
The authorization method also comprises the steps of detecting the computer using the authorized tool and judging whether the computer is used legally;
specifically, when the applied tool is used, a computer of the current executing tool is detected, and the detection content comprises a machine code, network time and the name of a person using the tool;
and (3) detecting a machine code: when the tool is used for the first time, computer hardware data such as a computer MAC address, a hard disk, a CPU serial number and the like are correspondingly encrypted and recorded in the tool, and the hardware data recorded by the tool is matched with the current computer hardware data when the tool is opened every time subsequently, so that whether the tool is used legally is judged.
The computer directly uses a program language, the statement of the program language is machine code, and the machine code is a group of binary numbers used for commanding the operation and operand addresses which the computer should do; the MAC address is also called physical address and hardware address, is burned in EPROM of network card when produced by network equipment manufacturer, the IP address and MAC address are both expressed in binary system in computer, the IP address is 32 bit, and the MAC address is 48 bit; the MAC address is 48 bits (6 bytes) in length, and is usually expressed as 12 16-ary numbers, such as: 00-16-EA-AE-3C-40 is a MAC address, where the first 3 bytes, the 16 system number 00-16-EA represents the network hardware manufacturer's number, which is assigned by IEEE, and the last 3 bytes, the 16 system number AE-3C-40 represents the serial number of a network product manufactured by the manufacturer; as long as the MAC address of the user is not changed, the MAC address is unique in the world; in a geometric sense, the MAC address is just like the ID card number on the ID card and has uniqueness;
each device in the network has a unique network identifier, which is called a MAC address or network card address, written inside the hardware when produced by the network device manufacturer. The MAC address is 48 bits (6 bytes), and is usually represented by 12 16-ary numbers, and every 2 16-ary numbers are separated by a colon, such as 08: 00: 20: 0A: 8C: 6D is a MAC address; specifically, as shown in the following figure, the first 3 bytes represent OUI, which is a code distributed by the registration management organization of IEEE to different manufacturers, and distinguishes different manufacturers, and the last 3 bytes are distributed by manufacturers; the second lower bit (LSb) of the MAC address Most Significant Byte (MSB) indicates whether this MAC address is global or local, i.e., the U/L bit, if 0, indicates a global address; all OUI bits are 0; the first low bit (LSb) of the MAC address Most Significant Byte (MSB) indicates whether this MAC address is unicast or multicast, 0 indicates unicast.
Network time detection: when the tool is opened every time, the tool must be opened under the condition of a network, so that the tool can acquire the Beijing time of the network, and the acquired network time is matched with the tool authorization time to judge whether the tool is within the authorization time.
Staff name detection using tools: and popping up a prompt box, inputting the name of a tool user, and judging whether the input name is consistent with the applicant when the tool is applied.
The embodiment of the invention provides a tool application authorization method, which comprises the steps of firstly obtaining tool application information; wherein the information includes a type, an authorization date, and an applicant; then judging whether the information meets the authorization condition according to the information and a pre-configured authorization white list; finally, if the judgment result is that the authorization condition is met, the tool is authorized and an authorization file is issued; according to the technical scheme, the evaluation task does not need to be established first, and then the tool authorization application operation does not need to be performed, so that a large number of tool authorization operations of a tool authorization unit can be reduced, a large amount of working time can be saved, and meanwhile, tools can be prevented from being illegally used.
Based on the same inventive concept, an embodiment of the present invention further provides a device for authorizing a tool application, which can be used to implement the method for authorizing a tool application described in the above embodiment, as described in the following embodiments: because the principle of solving the problem of the tool application authorization device is similar to that of a tool application authorization method, the implementation of the tool application authorization device can refer to the implementation of the tool application authorization method, and repeated parts are not repeated. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. While the system described in the embodiments below is preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
Fig. 2 shows a block diagram of a device for authorizing a tool application according to an embodiment of the present invention. As shown in fig. 2, the authorization apparatus includes:
an acquisition module 20 for acquiring tool application information; wherein the information includes a type, an authorization date, and an applicant;
the judging module 40 judges whether the authorization condition is met according to the information and a pre-configured authorization white list;
and the authorization module 60 applies for authorization to the tool and issues an authorization file if the judgment result is that the authorization condition is met.
The embodiment of the invention provides a tool application authorization device, which firstly obtains tool application information through an obtaining module 20; wherein the information includes a type, an authorization date, and an applicant; then the judging module 40 judges whether the authorization condition is met according to the information and a pre-configured authorization white list; finally, if the judgment result is that the authorization condition is met, the authorization module 60 applies for authorization to the tool and issues an authorization file; according to the technical scheme, the evaluation task does not need to be established first, and then the tool authorization application operation does not need to be performed, so that a large number of tool authorization operations of a tool authorization unit can be reduced, a large amount of working time can be saved, and meanwhile, tools can be prevented from being used illegally.
An embodiment of the present invention also provides a computer electronic device, and fig. 3 shows a schematic structural diagram of an electronic device to which an embodiment of the present invention can be applied, and as shown in fig. 3, the computer electronic device includes a Central Processing Unit (CPU)301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage section 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data necessary for system operation are also stored. The CPU 301, ROM 302, and RAM 303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
The following components are connected to the I/O interface 305: an input portion 306 including a keyboard, a mouse, and the like; an output section 307 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 308 including a hard disk and the like; and a communication section 309 including a network interface card such as a LAN card, a modem, or the like. The communication section 309 performs communication processing via a network such as the internet. A drive 310 is also connected to the I/O interface 305 as needed. A removable medium 311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 310 as necessary, so that a computer program read out therefrom is mounted into the storage section 308 as necessary.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present invention may be implemented by software, or may be implemented by hardware. The described units or modules may also be provided in a processor, and may be described as: a processor includes an obtaining module 20, a judging module 40 and an authorizing module 60, wherein names of these modules do not constitute a limitation to the module itself in some cases, for example, the judging module 40 can also be described as "judging module 40 for judging whether an authorization condition is met according to the information and a pre-configured authorization white list".
As another aspect, the present invention further provides a computer-readable storage medium, which may be the computer-readable storage medium included in the tool application authorizing apparatus in the above embodiment; or it may be a computer-readable storage medium that exists separately and is not built into the electronic device. The computer readable storage medium stores one or more programs for use by one or more processors in performing a tool application authorization method described in the present invention.
The foregoing description is only exemplary of the preferred embodiments of the invention and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features and (but not limited to) features having similar functions disclosed in the present invention are mutually replaced to form the technical solution.
Claims (10)
1. A method for authorizing a tool application, the method comprising:
acquiring tool application information; wherein the information includes a type, an authorization date, and an applicant;
judging whether the information meets the authorization condition or not according to the information and a pre-configured authorization white list;
and if the judgment result is that the authorization condition is met, applying for authorization to the tool and issuing an authorization file.
2. The authorization method according to claim 1, characterized in that it further comprises:
and if the judgment result is that the authorization condition is not met, prompting that the authorization fails and feeding back reasons or manually authorizing.
3. The authorization method according to claim 1, characterized in that the authorization method further comprises detecting whether the computer using the authorized tool is used legally.
4. The method of claim 3, wherein the detecting the authorized use of the computer includes machine code detection, the machine code detection including:
acquiring a computer MAC address, a hard disk and a CPU serial number in a tool record; the computer MAC address, the hard disk and the CPU serial number are encrypted when the tool is used for the first time and recorded in the tool;
and matching the computer MAC address, the hard disk and the CPU serial number with the current computer hardware data to judge whether the tool is used legally.
5. The method of claim 3, wherein the detecting the authorized use of the computer includes detecting a network time, the detecting the network time including:
acquiring the time when the tool equipment is used;
and matching the acquired time with the tool authorization time to judge whether the acquired time is within the authorization time.
6. The method of claim 3, wherein the detecting the authorized computer to determine whether the authorized computer is used legally comprises detecting a name of a person using the tool, wherein the detecting the name of the person using the tool comprises:
acquiring an input tool user name;
and matching the name of the tool user with the name of the applicant when the tool is applied to judge whether the tool user name and the applicant name are consistent.
7. A tool application authorization apparatus, the authorization apparatus comprising:
the acquisition module acquires tool application information; wherein the information includes a type, an authorization date, and an applicant;
the judging module judges whether the information accords with the authorization condition or not according to the information and a pre-configured authorization white list;
and the authorization module applies for authorization to the tool and issues an authorization file if the judgment result is that the authorization condition is met.
8. The authorization device according to claim 7, wherein the authorization device further comprises a validity detection module for detecting whether the computer using the authorized tool is valid.
9. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, wherein the processor, when executing the computer program, implements the method of any of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210227325.8A CN114595436A (en) | 2022-03-08 | 2022-03-08 | Tool application authorization method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210227325.8A CN114595436A (en) | 2022-03-08 | 2022-03-08 | Tool application authorization method and device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114595436A true CN114595436A (en) | 2022-06-07 |
Family
ID=81808565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210227325.8A Pending CN114595436A (en) | 2022-03-08 | 2022-03-08 | Tool application authorization method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114595436A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104700002A (en) * | 2013-12-05 | 2015-06-10 | 航天信息软件技术有限公司 | Software protecting, authorizing and registering method |
CN111159656A (en) * | 2019-11-18 | 2020-05-15 | 核芯互联科技(青岛)有限公司 | Method, device, equipment and storage medium for preventing software from being used without authorization |
CN113779511A (en) * | 2021-09-14 | 2021-12-10 | 湖南麒麟信安科技股份有限公司 | Software authorization method, device, server and readable storage medium |
-
2022
- 2022-03-08 CN CN202210227325.8A patent/CN114595436A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104700002A (en) * | 2013-12-05 | 2015-06-10 | 航天信息软件技术有限公司 | Software protecting, authorizing and registering method |
CN111159656A (en) * | 2019-11-18 | 2020-05-15 | 核芯互联科技(青岛)有限公司 | Method, device, equipment and storage medium for preventing software from being used without authorization |
CN113779511A (en) * | 2021-09-14 | 2021-12-10 | 湖南麒麟信安科技股份有限公司 | Software authorization method, device, server and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7788730B2 (en) | Secure bytecode instrumentation facility | |
EP3552098B1 (en) | Operating system update management for enrolled devices | |
US9118666B2 (en) | Computing device integrity verification | |
US10354068B2 (en) | Anonymized application scanning for mobile devices | |
US8117441B2 (en) | Integrating security protection tools with computer device integrity and privacy policy | |
US9767280B2 (en) | Information processing apparatus, method of controlling the same, information processing system, and information processing method | |
EP1862005B1 (en) | Application identity and rating service | |
JP4524288B2 (en) | Quarantine system | |
US20060174334A1 (en) | Controlling computer applications' access to data | |
US20070101401A1 (en) | Method and apparatus for super secure network authentication | |
JP6001781B2 (en) | Unauthorized access detection system and unauthorized access detection method | |
US20080098478A1 (en) | System, Method and Computer Program Product for Administering Trust Dependent Functional Control over a Portable Endpoint Security Device | |
US20070186112A1 (en) | Controlling execution of computer applications | |
US9917862B2 (en) | Integrated application scanning and mobile enterprise computing management system | |
JP2004265286A (en) | Management of mobile device according to security policy selected in dependence on environment | |
JP2010205270A (en) | Device for providing tamper evident property to executable code stored in removable medium | |
US20070079364A1 (en) | Directory-secured packages for authentication of software installation | |
MX2007013310A (en) | Method, system, and program product for connecting a client to a network. | |
Sharma et al. | Windows operating system vulnerabilities | |
CN110086812B (en) | Safe and controllable internal network safety patrol system and method | |
CN114595436A (en) | Tool application authorization method and device, electronic equipment and storage medium | |
US6802009B1 (en) | Operating system security checking system, method, and program | |
CN116938471A (en) | POS machine security authorization deployment method, POS machine security authorization deployment device and storage medium | |
Wang et al. | A new model for continuous network access control of trusted network connection | |
CN112650994A (en) | Screen watermark generation method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |