[go: nahoru, domu]

CN115021951B - Business application management method and system - Google Patents

Business application management method and system Download PDF

Info

Publication number
CN115021951B
CN115021951B CN202210384470.7A CN202210384470A CN115021951B CN 115021951 B CN115021951 B CN 115021951B CN 202210384470 A CN202210384470 A CN 202210384470A CN 115021951 B CN115021951 B CN 115021951B
Authority
CN
China
Prior art keywords
service
application
business
business application
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210384470.7A
Other languages
Chinese (zh)
Other versions
CN115021951A (en
Inventor
晏雨琪
汪善富
王志
祝青柳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Leagsoft Technology Co ltd
Original Assignee
Shenzhen Leagsoft Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Leagsoft Technology Co ltd filed Critical Shenzhen Leagsoft Technology Co ltd
Priority to CN202210384470.7A priority Critical patent/CN115021951B/en
Publication of CN115021951A publication Critical patent/CN115021951A/en
Application granted granted Critical
Publication of CN115021951B publication Critical patent/CN115021951B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a business application management method and a business application management system, wherein the method comprises the steps of receiving importance level and function category of business application to be put on shelf; searching a service application management library according to the importance level and the function class to obtain a service specification of the service application to be put on shelf; after the service application is put on shelf, configuring the service application according to the service specification; and sending the configured business application to the client. The method has the following advantages: before the business application is put on shelf, the business can be assisted to make standard business specifications according to importance levels and function categories, so that each department can control the flow according to the unified standard business specifications, and the communication cost between the departments is reduced. The business application is managed by the same system platform, so that the business, security and authorization integrated whole-flow management is realized, a plurality of system platforms do not need to be in butt joint, and the management operation and maintenance efficiency is improved.

Description

Business application management method and system
Technical Field
The invention belongs to the technical field of application security, and particularly relates to a business application management method and system.
Background
In the age of rapid development of mobile services, the internal security specification management of business applications is particularly important. At present, most business application development, application security management and security audit in business processes of enterprises belong to personnel management of different departments, and the used systems are different. The service development department mainly focuses on the functionality of the service, has low safety compliance attention to service application, and only hopes that the service is rapidly put on shelf for popularization and use. The application management department only concerns the release popularization of the application, the management of the application authority, the access control and the identity authentication, and does not pay attention to the security risk faced by the application. The security audit department mainly focuses on aspects of terminal security, mobile security, boundary security, operation and maintenance security, data security and the like.
Because of the diversity and complexity of the business, the enterprise mostly lacks unified business application management specifications, and because the focus of attention is different, each department has contradiction points, and the communication cost is higher. Meanwhile, as different systems are used by all departments, the butt joint is difficult, and the rapid and safe putting on shelf popularization of business application is not facilitated.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a business application management method and a business application management system, unifies business application management specifications and reduces communication cost among departments.
In a first aspect, a service application management method includes:
receiving importance levels and function categories of service applications to be put on shelf;
Searching a service application management library according to the importance level and the function class to obtain a service specification of the service application to be put on shelf;
after the service application is put on shelf, configuring the service application according to the service specification;
and sending the configured business application to the client.
Preferably, the service application management library is constructed by the following method:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
Preferably, the device-level security check policy and trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
Preferably, the rights include:
access rights, functional rights, and data rights of the business application.
Preferably, the business application is further configured to receive a trust score of the client, and adjust the authority of the user to access according to the trust score.
In a second aspect, a business application management system includes:
and (3) a management platform: the method comprises the steps of receiving importance levels and function categories of service applications to be put on shelf, searching a service application management library according to the importance levels and the function categories to obtain service specifications of the service applications to be put on shelf; the management platform is also used for configuring the service application according to the service specification after the service application is put on shelf, and transmitting the configured service application to the client;
client side: for running business applications.
Preferably, the service application management library is constructed by the following method:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
Preferably, the device-level security check policy and trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
Preferably, the rights include:
access rights, functional rights, and data rights of the business application.
Preferably, the business application is further configured to receive a trust score of the client, and adjust the authority of the user to access according to the trust score.
As can be seen from the technical scheme, the business application management method and system provided by the invention have the following advantages:
1) Before the business application is put on shelf, the business can be assisted to make standard business specifications according to importance levels and function categories, so that each department can control the flow according to the unified standard business specifications, and the communication cost between the departments is reduced.
2) The business application is managed by the same system platform, so that the business, security and authorization integrated whole-flow management is realized, a plurality of system platforms do not need to be in butt joint, and the management operation and maintenance efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
Fig. 1 is a flowchart of a service application management method provided in an embodiment.
Fig. 2 is a flowchart of a method for setting and configuring a service specification according to an embodiment.
Fig. 3 is a flowchart of a method for running a service application according to an embodiment.
Fig. 4 is a block diagram of a business application management system according to an embodiment.
Detailed Description
Embodiments of the technical scheme of the present application will be described in detail below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present application, and thus are merely examples, and are not intended to limit the scope of the present application. It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Examples:
a business application management method, see fig. 1, comprising:
S1: receiving importance levels and function categories of service applications to be put on shelf;
S2: searching a service application management library according to the importance level and the function class to obtain a service specification of the service application to be put on shelf;
s3: after the service application is put on shelf, configuring the service application according to the service specification;
s4: and sending the configured business application to the client.
In the traditional business application management method, when new business applications need to be put on shelf, various departments of an enterprise are required to configure information such as operation authority, access authority, security policy and the like of the business applications. In general, the same type, the same enterprise or the same industry of business applications are managed by adopting the same set of rules, so that for the business applications managed by adopting the same set of rules, many configuration operations at the front end of the business applications are repeated, and different information has certain relevance, such as the same access rights of the business applications with the same importance level. Therefore, the method associates the service specifications with the importance level and the function category respectively, and when the importance level and the function category of the service application are determined, the corresponding service specifications are automatically generated, so that the communication cost of each department is reduced.
In this embodiment, the importance levels of the business applications of the same type, the same enterprise, or the same industry may include multiple levels, for example, the importance levels may be divided into 5 levels: a1 to A5. Importance levels also support customization, which may be, for example, custom as general, important, core, etc. The functional categories of the business applications may include multiple categories, and also support customization, e.g., the functional categories may be mobile office, mobile exhibition, etc. The business applications under the same function class may have multiple importance levels, or the business applications under the same importance level may have multiple function classes. The service application management library stores a plurality of service specifications, and each service specification corresponds to a function class and an importance level. After the business application is put on the application store, the application store can perform clustering display on the business application according to the function class and the importance level.
In this embodiment, before the service application is put on the shelf, the method may be used to enter importance levels and function categories of the service application by related personnel of the enterprise, then search corresponding service specifications according to the importance levels and the function categories, and after the service application is put on the shelf, configure the service application according to the service specifications in a unified manner, and after the configuration is completed, issue the service application to the client for use.
The business application management method has the following advantages:
1) Before the business application is put on shelf, the business can be assisted to make standard business specifications according to importance levels and function categories, so that each department can control the flow according to the unified standard business specifications, and the communication cost between the departments is reduced.
2) The business application is managed by the same system platform, so that the business, security and authorization integrated whole-flow management is realized, a plurality of system platforms do not need to be in butt joint, and the management operation and maintenance efficiency is improved.
Further, in some embodiments, referring to fig. 2, the business application management library is constructed by:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
In this embodiment, the service application access body is an object for using a service application, and mainly includes a client. On the premise of determining importance level and function category of service application, the method can configure different device-level security check strategies and trust scoring rules for different service application access subjects. The device-level security inspection policy may be configured based on inspection results of security inspection items such as environmental awareness, identity verification, abnormal behavior, etc., for example, the device-level security inspection policy may include policies for traffic anomalies, log-in from different places, suspicious downloads, etc. The trust scoring rules may include scoring criteria, withholding criteria, and/or scoring weights. The trust scoring rules may also be configured based on the results of security check items such as environmental awareness, identity verification, abnormal behavior, etc., e.g., the trust scoring rules may include detecting device screen locking password non-compliance, withholding 5 points.
In this embodiment, the method may configure a security level scoring rule for the service application access principal, for example, the security level scoring rule may include trust scoring thresholds of different security levels, so as to determine the security level of the service application access principal according to the trust score of the service application access principal. For example, the security level scoring rules include a trust score of less than 50 points, with a security level of high risk; the trust score is equal to 100 points and the security level is healthy. The method can also weight the checking results of each security checking item to obtain the trust score of the business application access main body, and determine the security level of the business application access main body according to the trust score.
In this embodiment, the method may set the authority of the service application access subject to access the service application under different security levels. The rights may include access rights, function rights, data rights, etc. of the business application. For example, the method can configure whether the user has access rights, function rights and data rights of the service application under different security levels by the service application access subject.
In this embodiment, the method may configure an application level security policy for service applications with different importance levels and different function categories, where the application level security policy may include a plurality of security check items such as environment awareness, identity verification, and abnormal behavior. The environment-aware security check item can detect and analyze terminal environments, identity information and operation behaviors of the business application access main body.
In this embodiment, the method for configuring the service application according to the service specification includes: when the service application is put on the shelf, the application manager can configure the importance level and the function class of the service application according to the service specification, and the authority of the service application when the service application access main body is in different security levels. The security administrator may configure device-level security check policies and trust scoring rules for the business application access principal, security level scoring rules for the business application access principal, and application-level security policies for the business application.
Further, in some embodiments, the business application is further configured to receive a trust score for the client and adjust the rights of the user to access based on the trust score.
In this embodiment, the client may perform continuous trust evaluation on the terminal environment, identity information and operation behavior according to the device-level security policy and the trust scoring rule, obtain a trust score, obtain the security level of the client according to the trust score and the security level scoring rule, and each level of various service applications obtain the authority of user access according to the obtained security level, so as to implement minimum-granularity dynamic authorization, and ensure the security of the service applications. The client may configure an application level security policy to be effective for the specified service application.
In this embodiment, referring to fig. 3, after the service application is issued to the client, the client receives authentication information entered by the user, and sends the authentication information to the core authentication and authorization device for authentication, and when authentication is successful, a session between the client and the core authentication and authorization device is established. The client sends the device-level security check policy, the application-level security policy and the permission to the security gateway, the client carries out continuous trust scoring, and the obtained security level is reported to the security gateway. And if the security level changes, re-authenticating the core authentication and authorization equipment and the service system. When a user opens a service application of a client, the client initiates authentication to a service system, the service system requests service function data authority to a core authentication and authorization device, the core authentication and authorization device returns the service function data authority to the service system, the service system returns an authentication result to the client, the client initiates a service request to the service system, and the service system responds to the service request to the client. Therefore, the method can release the full-flow encryption of the access subject conforming to the security level based on the local trusted agent and the service trusted access service agent, and otherwise, the method blocks the full-flow encryption of the access subject conforming to the security level, thereby realizing the dynamic access control of the application.
A business application management system, see fig. 4, comprising:
Management platform 1: the method comprises the steps of receiving importance levels and function categories of service applications to be put on shelf, searching a service application management library according to the importance levels and the function categories to obtain service specifications of the service applications to be put on shelf; the management platform 1 is further configured to configure a service application according to a service specification after the service application is on shelf, and send the configured service application to the client 2;
Client 2: for running business applications.
Further, in some embodiments, the business application management library is constructed by:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
Further, in some embodiments, the device-level security check policies and trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
Further, in some embodiments, the rights include:
access rights, functional rights, and data rights of the business application.
Further, in some embodiments, the business application is further configured to receive a trust score of the client 2, and adjust the rights of the user access according to the trust score.
For a brief description of the system provided by the embodiments of the present invention, reference may be made to the corresponding content in the foregoing embodiments where the description of the embodiments is not mentioned.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.

Claims (8)

1. A business application management method, comprising:
receiving importance levels and function categories of service applications to be put on shelf;
searching a service application management library according to the importance level and the function class to obtain a service specification of the service application to be put on shelf;
After the service application is put on shelf, configuring the service application according to the service specification;
the configured business application is issued to a client;
the business application management library is constructed by the following method:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
2. The method for managing a business application of claim 1, wherein,
The device-level security check policy and the trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
3. The business application management method according to claim 1, wherein the authority includes:
access rights, functional rights, and data rights of the business application.
4. The method for managing a business application of claim 1, wherein,
The business application is also used for receiving the trust score of the client and adjusting the access authority of the user according to the trust score.
5. A business application management system, comprising:
and (3) a management platform: the method comprises the steps of receiving importance levels and function categories of service applications to be put on shelf, and searching a service application management library according to the importance levels and the function categories to obtain service specifications of the service applications to be put on shelf; the management platform is also used for configuring the service application according to the service specification after the service application is put on shelf, and issuing the configured service application to a client;
client side: for running the business application;
the business application management library is constructed by the following method:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
6. The business application management system of claim 5, wherein,
The device-level security check policy and the trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
7. The business application management system of claim 5, wherein said rights include:
access rights, functional rights, and data rights of the business application.
8. The business application management system of claim 5, wherein,
The business application is also used for receiving the trust score of the client and adjusting the access authority of the user according to the trust score.
CN202210384470.7A 2022-04-13 2022-04-13 Business application management method and system Active CN115021951B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210384470.7A CN115021951B (en) 2022-04-13 2022-04-13 Business application management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210384470.7A CN115021951B (en) 2022-04-13 2022-04-13 Business application management method and system

Publications (2)

Publication Number Publication Date
CN115021951A CN115021951A (en) 2022-09-06
CN115021951B true CN115021951B (en) 2024-05-17

Family

ID=83067787

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210384470.7A Active CN115021951B (en) 2022-04-13 2022-04-13 Business application management method and system

Country Status (1)

Country Link
CN (1) CN115021951B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003087982A2 (en) * 2002-04-08 2003-10-23 Cyanea Systems Corp. Method and system for problem determination in distributed enterprise applications
WO2013122991A1 (en) * 2012-02-13 2013-08-22 Antenna Software, Inc. Integrated mobile application development platform
WO2015192796A1 (en) * 2014-06-20 2015-12-23 中国银联股份有限公司 Automatic application release method and system based on trusted service manager
CN106487775A (en) * 2015-09-01 2017-03-08 阿里巴巴集团控股有限公司 A kind for the treatment of method and apparatus of the business datum based on cloud platform
CN106647560A (en) * 2016-11-23 2017-05-10 中国南方电网有限责任公司 Mobile application unified management method
CN108183915A (en) * 2018-01-15 2018-06-19 中国科学院信息工程研究所 It is a kind of to realize frame towards the safety label of high safety grade business and application demand
CN109873834A (en) * 2019-03-22 2019-06-11 云南电网有限责任公司 A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing
CN111539775A (en) * 2020-05-07 2020-08-14 网易(杭州)网络有限公司 Application program management method and device
CN111708698A (en) * 2020-06-16 2020-09-25 中国银行股份有限公司 Application program simulation filing method and related device
CN111738296A (en) * 2020-05-22 2020-10-02 广东科学技术职业学院 One-stop service platform based on data fusion
CN111932343A (en) * 2020-08-14 2020-11-13 深圳市泽汇科技有限公司 Automatic product shelf loading management method, device, equipment and storage medium
CN112068807A (en) * 2020-07-17 2020-12-11 石化盈科信息技术有限责任公司 Process industrial application software ecosystem, development method and storage medium
CN112153425A (en) * 2020-09-03 2020-12-29 河南网络广播电视台有限公司 Broadcast control management system
CN112256588A (en) * 2020-11-10 2021-01-22 广州掌动智能科技有限公司 Resource allocation method for application program test, computer readable storage medium and tester
CN112380522A (en) * 2020-11-11 2021-02-19 深圳供电局有限公司 Management system and method for integrated service mobile application
CN112783384A (en) * 2019-11-08 2021-05-11 荣耀终端有限公司 Control method for cloud application operation and electronic equipment
CN113296744A (en) * 2021-05-21 2021-08-24 建信金融科技有限责任公司 Application development system and method
CN113568970A (en) * 2021-02-03 2021-10-29 腾讯科技(深圳)有限公司 Application service data management method, device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10614406B2 (en) * 2018-06-18 2020-04-07 Bank Of America Corporation Core process framework for integrating disparate applications

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003087982A2 (en) * 2002-04-08 2003-10-23 Cyanea Systems Corp. Method and system for problem determination in distributed enterprise applications
WO2013122991A1 (en) * 2012-02-13 2013-08-22 Antenna Software, Inc. Integrated mobile application development platform
WO2015192796A1 (en) * 2014-06-20 2015-12-23 中国银联股份有限公司 Automatic application release method and system based on trusted service manager
CN105279670A (en) * 2014-06-20 2016-01-27 中国银联股份有限公司 Automatic application publishing method and system based on trusted service management platform
CN106487775A (en) * 2015-09-01 2017-03-08 阿里巴巴集团控股有限公司 A kind for the treatment of method and apparatus of the business datum based on cloud platform
CN106647560A (en) * 2016-11-23 2017-05-10 中国南方电网有限责任公司 Mobile application unified management method
CN108183915A (en) * 2018-01-15 2018-06-19 中国科学院信息工程研究所 It is a kind of to realize frame towards the safety label of high safety grade business and application demand
CN109873834A (en) * 2019-03-22 2019-06-11 云南电网有限责任公司 A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing
CN112783384A (en) * 2019-11-08 2021-05-11 荣耀终端有限公司 Control method for cloud application operation and electronic equipment
CN111539775A (en) * 2020-05-07 2020-08-14 网易(杭州)网络有限公司 Application program management method and device
CN111738296A (en) * 2020-05-22 2020-10-02 广东科学技术职业学院 One-stop service platform based on data fusion
CN111708698A (en) * 2020-06-16 2020-09-25 中国银行股份有限公司 Application program simulation filing method and related device
CN112068807A (en) * 2020-07-17 2020-12-11 石化盈科信息技术有限责任公司 Process industrial application software ecosystem, development method and storage medium
CN111932343A (en) * 2020-08-14 2020-11-13 深圳市泽汇科技有限公司 Automatic product shelf loading management method, device, equipment and storage medium
CN112153425A (en) * 2020-09-03 2020-12-29 河南网络广播电视台有限公司 Broadcast control management system
CN112256588A (en) * 2020-11-10 2021-01-22 广州掌动智能科技有限公司 Resource allocation method for application program test, computer readable storage medium and tester
CN112380522A (en) * 2020-11-11 2021-02-19 深圳供电局有限公司 Management system and method for integrated service mobile application
CN113568970A (en) * 2021-02-03 2021-10-29 腾讯科技(深圳)有限公司 Application service data management method, device, equipment and storage medium
CN113296744A (en) * 2021-05-21 2021-08-24 建信金融科技有限责任公司 Application development system and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Design of Mobile Application Lifecycle Security Management Platform";Y. Zeng等;《2021 International Conference on Computer Network, Electronic and Automation (ICCNEA)》;20211119;全文 *
面向企业的移动信息化整体解决方案;徐隆龙;李莹;胡博;;计算机系统应用;20141215(12);全文 *

Also Published As

Publication number Publication date
CN115021951A (en) 2022-09-06

Similar Documents

Publication Publication Date Title
US9137096B1 (en) Policy based network compliance
CN111935165B (en) Access control method, device, electronic device and medium
US11582242B2 (en) System, computer program product and method for risk evaluation of API login and use
US8666894B1 (en) Systems and methods for remotely authenticating credit card transactions
US8561144B2 (en) Enforcing security based on a security state assessment of a mobile device
US20060020816A1 (en) Method and system for managing authentication attempts
EP3195174B1 (en) Conditional access to services based on device claims
JP2005526311A (en) Method and apparatus for monitoring a database system
CN112818328A (en) Multi-system authority management method, device, equipment and storage medium
US9832184B2 (en) Controls and administration of privileged accounts system
US9635017B2 (en) Computer network security management system and method
KR20100133713A (en) Database security system, server and method which can protect user's access to database through application
KR20100002592A (en) Method for accounting information security, computer-readable medium for storing a program for executing the method, and system for preforming the same
KR101768942B1 (en) System and method for secure authentication to user access
JP4843546B2 (en) Information leakage monitoring system and information leakage monitoring method
CN116633594B (en) Flamingo gateway security system
CN115021951B (en) Business application management method and system
CN111030997A (en) Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium
CN117195168A (en) Abnormal access identification method and device
CN116996238A (en) Processing method and related device for network abnormal access
JP4175574B1 (en) Management system, management server, and management program
KR20040040412A (en) Management System and method of Social Security number
JP2020095750A (en) Business information protection device, business information protection method, and program
CN118364489A (en) Authority verification method, device, equipment and storage medium
CN116866032A (en) Privilege account management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant