CN115021951B - Business application management method and system - Google Patents
Business application management method and system Download PDFInfo
- Publication number
- CN115021951B CN115021951B CN202210384470.7A CN202210384470A CN115021951B CN 115021951 B CN115021951 B CN 115021951B CN 202210384470 A CN202210384470 A CN 202210384470A CN 115021951 B CN115021951 B CN 115021951B
- Authority
- CN
- China
- Prior art keywords
- service
- application
- business
- business application
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims abstract description 55
- 238000000034 method Methods 0.000 claims abstract description 25
- 206010000117 Abnormal behaviour Diseases 0.000 claims description 8
- 238000012795 verification Methods 0.000 claims description 8
- 230000007613 environmental effect Effects 0.000 claims description 7
- 238000013475 authorization Methods 0.000 abstract description 9
- 238000004891 communication Methods 0.000 abstract description 6
- 210000001503 joint Anatomy 0.000 abstract description 4
- 238000012423 maintenance Methods 0.000 abstract description 4
- 238000007689 inspection Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a business application management method and a business application management system, wherein the method comprises the steps of receiving importance level and function category of business application to be put on shelf; searching a service application management library according to the importance level and the function class to obtain a service specification of the service application to be put on shelf; after the service application is put on shelf, configuring the service application according to the service specification; and sending the configured business application to the client. The method has the following advantages: before the business application is put on shelf, the business can be assisted to make standard business specifications according to importance levels and function categories, so that each department can control the flow according to the unified standard business specifications, and the communication cost between the departments is reduced. The business application is managed by the same system platform, so that the business, security and authorization integrated whole-flow management is realized, a plurality of system platforms do not need to be in butt joint, and the management operation and maintenance efficiency is improved.
Description
Technical Field
The invention belongs to the technical field of application security, and particularly relates to a business application management method and system.
Background
In the age of rapid development of mobile services, the internal security specification management of business applications is particularly important. At present, most business application development, application security management and security audit in business processes of enterprises belong to personnel management of different departments, and the used systems are different. The service development department mainly focuses on the functionality of the service, has low safety compliance attention to service application, and only hopes that the service is rapidly put on shelf for popularization and use. The application management department only concerns the release popularization of the application, the management of the application authority, the access control and the identity authentication, and does not pay attention to the security risk faced by the application. The security audit department mainly focuses on aspects of terminal security, mobile security, boundary security, operation and maintenance security, data security and the like.
Because of the diversity and complexity of the business, the enterprise mostly lacks unified business application management specifications, and because the focus of attention is different, each department has contradiction points, and the communication cost is higher. Meanwhile, as different systems are used by all departments, the butt joint is difficult, and the rapid and safe putting on shelf popularization of business application is not facilitated.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a business application management method and a business application management system, unifies business application management specifications and reduces communication cost among departments.
In a first aspect, a service application management method includes:
receiving importance levels and function categories of service applications to be put on shelf;
Searching a service application management library according to the importance level and the function class to obtain a service specification of the service application to be put on shelf;
after the service application is put on shelf, configuring the service application according to the service specification;
and sending the configured business application to the client.
Preferably, the service application management library is constructed by the following method:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
Preferably, the device-level security check policy and trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
Preferably, the rights include:
access rights, functional rights, and data rights of the business application.
Preferably, the business application is further configured to receive a trust score of the client, and adjust the authority of the user to access according to the trust score.
In a second aspect, a business application management system includes:
and (3) a management platform: the method comprises the steps of receiving importance levels and function categories of service applications to be put on shelf, searching a service application management library according to the importance levels and the function categories to obtain service specifications of the service applications to be put on shelf; the management platform is also used for configuring the service application according to the service specification after the service application is put on shelf, and transmitting the configured service application to the client;
client side: for running business applications.
Preferably, the service application management library is constructed by the following method:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
Preferably, the device-level security check policy and trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
Preferably, the rights include:
access rights, functional rights, and data rights of the business application.
Preferably, the business application is further configured to receive a trust score of the client, and adjust the authority of the user to access according to the trust score.
As can be seen from the technical scheme, the business application management method and system provided by the invention have the following advantages:
1) Before the business application is put on shelf, the business can be assisted to make standard business specifications according to importance levels and function categories, so that each department can control the flow according to the unified standard business specifications, and the communication cost between the departments is reduced.
2) The business application is managed by the same system platform, so that the business, security and authorization integrated whole-flow management is realized, a plurality of system platforms do not need to be in butt joint, and the management operation and maintenance efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
Fig. 1 is a flowchart of a service application management method provided in an embodiment.
Fig. 2 is a flowchart of a method for setting and configuring a service specification according to an embodiment.
Fig. 3 is a flowchart of a method for running a service application according to an embodiment.
Fig. 4 is a block diagram of a business application management system according to an embodiment.
Detailed Description
Embodiments of the technical scheme of the present application will be described in detail below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present application, and thus are merely examples, and are not intended to limit the scope of the present application. It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Examples:
a business application management method, see fig. 1, comprising:
S1: receiving importance levels and function categories of service applications to be put on shelf;
S2: searching a service application management library according to the importance level and the function class to obtain a service specification of the service application to be put on shelf;
s3: after the service application is put on shelf, configuring the service application according to the service specification;
s4: and sending the configured business application to the client.
In the traditional business application management method, when new business applications need to be put on shelf, various departments of an enterprise are required to configure information such as operation authority, access authority, security policy and the like of the business applications. In general, the same type, the same enterprise or the same industry of business applications are managed by adopting the same set of rules, so that for the business applications managed by adopting the same set of rules, many configuration operations at the front end of the business applications are repeated, and different information has certain relevance, such as the same access rights of the business applications with the same importance level. Therefore, the method associates the service specifications with the importance level and the function category respectively, and when the importance level and the function category of the service application are determined, the corresponding service specifications are automatically generated, so that the communication cost of each department is reduced.
In this embodiment, the importance levels of the business applications of the same type, the same enterprise, or the same industry may include multiple levels, for example, the importance levels may be divided into 5 levels: a1 to A5. Importance levels also support customization, which may be, for example, custom as general, important, core, etc. The functional categories of the business applications may include multiple categories, and also support customization, e.g., the functional categories may be mobile office, mobile exhibition, etc. The business applications under the same function class may have multiple importance levels, or the business applications under the same importance level may have multiple function classes. The service application management library stores a plurality of service specifications, and each service specification corresponds to a function class and an importance level. After the business application is put on the application store, the application store can perform clustering display on the business application according to the function class and the importance level.
In this embodiment, before the service application is put on the shelf, the method may be used to enter importance levels and function categories of the service application by related personnel of the enterprise, then search corresponding service specifications according to the importance levels and the function categories, and after the service application is put on the shelf, configure the service application according to the service specifications in a unified manner, and after the configuration is completed, issue the service application to the client for use.
The business application management method has the following advantages:
1) Before the business application is put on shelf, the business can be assisted to make standard business specifications according to importance levels and function categories, so that each department can control the flow according to the unified standard business specifications, and the communication cost between the departments is reduced.
2) The business application is managed by the same system platform, so that the business, security and authorization integrated whole-flow management is realized, a plurality of system platforms do not need to be in butt joint, and the management operation and maintenance efficiency is improved.
Further, in some embodiments, referring to fig. 2, the business application management library is constructed by:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
In this embodiment, the service application access body is an object for using a service application, and mainly includes a client. On the premise of determining importance level and function category of service application, the method can configure different device-level security check strategies and trust scoring rules for different service application access subjects. The device-level security inspection policy may be configured based on inspection results of security inspection items such as environmental awareness, identity verification, abnormal behavior, etc., for example, the device-level security inspection policy may include policies for traffic anomalies, log-in from different places, suspicious downloads, etc. The trust scoring rules may include scoring criteria, withholding criteria, and/or scoring weights. The trust scoring rules may also be configured based on the results of security check items such as environmental awareness, identity verification, abnormal behavior, etc., e.g., the trust scoring rules may include detecting device screen locking password non-compliance, withholding 5 points.
In this embodiment, the method may configure a security level scoring rule for the service application access principal, for example, the security level scoring rule may include trust scoring thresholds of different security levels, so as to determine the security level of the service application access principal according to the trust score of the service application access principal. For example, the security level scoring rules include a trust score of less than 50 points, with a security level of high risk; the trust score is equal to 100 points and the security level is healthy. The method can also weight the checking results of each security checking item to obtain the trust score of the business application access main body, and determine the security level of the business application access main body according to the trust score.
In this embodiment, the method may set the authority of the service application access subject to access the service application under different security levels. The rights may include access rights, function rights, data rights, etc. of the business application. For example, the method can configure whether the user has access rights, function rights and data rights of the service application under different security levels by the service application access subject.
In this embodiment, the method may configure an application level security policy for service applications with different importance levels and different function categories, where the application level security policy may include a plurality of security check items such as environment awareness, identity verification, and abnormal behavior. The environment-aware security check item can detect and analyze terminal environments, identity information and operation behaviors of the business application access main body.
In this embodiment, the method for configuring the service application according to the service specification includes: when the service application is put on the shelf, the application manager can configure the importance level and the function class of the service application according to the service specification, and the authority of the service application when the service application access main body is in different security levels. The security administrator may configure device-level security check policies and trust scoring rules for the business application access principal, security level scoring rules for the business application access principal, and application-level security policies for the business application.
Further, in some embodiments, the business application is further configured to receive a trust score for the client and adjust the rights of the user to access based on the trust score.
In this embodiment, the client may perform continuous trust evaluation on the terminal environment, identity information and operation behavior according to the device-level security policy and the trust scoring rule, obtain a trust score, obtain the security level of the client according to the trust score and the security level scoring rule, and each level of various service applications obtain the authority of user access according to the obtained security level, so as to implement minimum-granularity dynamic authorization, and ensure the security of the service applications. The client may configure an application level security policy to be effective for the specified service application.
In this embodiment, referring to fig. 3, after the service application is issued to the client, the client receives authentication information entered by the user, and sends the authentication information to the core authentication and authorization device for authentication, and when authentication is successful, a session between the client and the core authentication and authorization device is established. The client sends the device-level security check policy, the application-level security policy and the permission to the security gateway, the client carries out continuous trust scoring, and the obtained security level is reported to the security gateway. And if the security level changes, re-authenticating the core authentication and authorization equipment and the service system. When a user opens a service application of a client, the client initiates authentication to a service system, the service system requests service function data authority to a core authentication and authorization device, the core authentication and authorization device returns the service function data authority to the service system, the service system returns an authentication result to the client, the client initiates a service request to the service system, and the service system responds to the service request to the client. Therefore, the method can release the full-flow encryption of the access subject conforming to the security level based on the local trusted agent and the service trusted access service agent, and otherwise, the method blocks the full-flow encryption of the access subject conforming to the security level, thereby realizing the dynamic access control of the application.
A business application management system, see fig. 4, comprising:
Management platform 1: the method comprises the steps of receiving importance levels and function categories of service applications to be put on shelf, searching a service application management library according to the importance levels and the function categories to obtain service specifications of the service applications to be put on shelf; the management platform 1 is further configured to configure a service application according to a service specification after the service application is on shelf, and send the configured service application to the client 2;
Client 2: for running business applications.
Further, in some embodiments, the business application management library is constructed by:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
Further, in some embodiments, the device-level security check policies and trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
Further, in some embodiments, the rights include:
access rights, functional rights, and data rights of the business application.
Further, in some embodiments, the business application is further configured to receive a trust score of the client 2, and adjust the rights of the user access according to the trust score.
For a brief description of the system provided by the embodiments of the present invention, reference may be made to the corresponding content in the foregoing embodiments where the description of the embodiments is not mentioned.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.
Claims (8)
1. A business application management method, comprising:
receiving importance levels and function categories of service applications to be put on shelf;
searching a service application management library according to the importance level and the function class to obtain a service specification of the service application to be put on shelf;
After the service application is put on shelf, configuring the service application according to the service specification;
the configured business application is issued to a client;
the business application management library is constructed by the following method:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
2. The method for managing a business application of claim 1, wherein,
The device-level security check policy and the trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
3. The business application management method according to claim 1, wherein the authority includes:
access rights, functional rights, and data rights of the business application.
4. The method for managing a business application of claim 1, wherein,
The business application is also used for receiving the trust score of the client and adjusting the access authority of the user according to the trust score.
5. A business application management system, comprising:
and (3) a management platform: the method comprises the steps of receiving importance levels and function categories of service applications to be put on shelf, and searching a service application management library according to the importance levels and the function categories to obtain service specifications of the service applications to be put on shelf; the management platform is also used for configuring the service application according to the service specification after the service application is put on shelf, and issuing the configured service application to a client;
client side: for running the business application;
the business application management library is constructed by the following method:
different importance levels and different function categories in the service application are configured;
Configuring a device-level security check policy and a trust scoring rule of a service application access subject;
configuring security level scoring rules of a business application access subject;
Configuring the authority of a user to access the service application when the service application access main body is in different security levels;
And configuring application-level security policies of business applications with different importance levels and different function categories.
6. The business application management system of claim 5, wherein,
The device-level security check policy and the trust scoring rules each correspond to at least one of the following security check items:
environmental awareness, identity verification and abnormal behavior.
7. The business application management system of claim 5, wherein said rights include:
access rights, functional rights, and data rights of the business application.
8. The business application management system of claim 5, wherein,
The business application is also used for receiving the trust score of the client and adjusting the access authority of the user according to the trust score.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210384470.7A CN115021951B (en) | 2022-04-13 | 2022-04-13 | Business application management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210384470.7A CN115021951B (en) | 2022-04-13 | 2022-04-13 | Business application management method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115021951A CN115021951A (en) | 2022-09-06 |
CN115021951B true CN115021951B (en) | 2024-05-17 |
Family
ID=83067787
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210384470.7A Active CN115021951B (en) | 2022-04-13 | 2022-04-13 | Business application management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115021951B (en) |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003087982A2 (en) * | 2002-04-08 | 2003-10-23 | Cyanea Systems Corp. | Method and system for problem determination in distributed enterprise applications |
WO2013122991A1 (en) * | 2012-02-13 | 2013-08-22 | Antenna Software, Inc. | Integrated mobile application development platform |
WO2015192796A1 (en) * | 2014-06-20 | 2015-12-23 | 中国银联股份有限公司 | Automatic application release method and system based on trusted service manager |
CN106487775A (en) * | 2015-09-01 | 2017-03-08 | 阿里巴巴集团控股有限公司 | A kind for the treatment of method and apparatus of the business datum based on cloud platform |
CN106647560A (en) * | 2016-11-23 | 2017-05-10 | 中国南方电网有限责任公司 | Mobile application unified management method |
CN108183915A (en) * | 2018-01-15 | 2018-06-19 | 中国科学院信息工程研究所 | It is a kind of to realize frame towards the safety label of high safety grade business and application demand |
CN109873834A (en) * | 2019-03-22 | 2019-06-11 | 云南电网有限责任公司 | A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing |
CN111539775A (en) * | 2020-05-07 | 2020-08-14 | 网易(杭州)网络有限公司 | Application program management method and device |
CN111708698A (en) * | 2020-06-16 | 2020-09-25 | 中国银行股份有限公司 | Application program simulation filing method and related device |
CN111738296A (en) * | 2020-05-22 | 2020-10-02 | 广东科学技术职业学院 | One-stop service platform based on data fusion |
CN111932343A (en) * | 2020-08-14 | 2020-11-13 | 深圳市泽汇科技有限公司 | Automatic product shelf loading management method, device, equipment and storage medium |
CN112068807A (en) * | 2020-07-17 | 2020-12-11 | 石化盈科信息技术有限责任公司 | Process industrial application software ecosystem, development method and storage medium |
CN112153425A (en) * | 2020-09-03 | 2020-12-29 | 河南网络广播电视台有限公司 | Broadcast control management system |
CN112256588A (en) * | 2020-11-10 | 2021-01-22 | 广州掌动智能科技有限公司 | Resource allocation method for application program test, computer readable storage medium and tester |
CN112380522A (en) * | 2020-11-11 | 2021-02-19 | 深圳供电局有限公司 | Management system and method for integrated service mobile application |
CN112783384A (en) * | 2019-11-08 | 2021-05-11 | 荣耀终端有限公司 | Control method for cloud application operation and electronic equipment |
CN113296744A (en) * | 2021-05-21 | 2021-08-24 | 建信金融科技有限责任公司 | Application development system and method |
CN113568970A (en) * | 2021-02-03 | 2021-10-29 | 腾讯科技(深圳)有限公司 | Application service data management method, device, equipment and storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10614406B2 (en) * | 2018-06-18 | 2020-04-07 | Bank Of America Corporation | Core process framework for integrating disparate applications |
-
2022
- 2022-04-13 CN CN202210384470.7A patent/CN115021951B/en active Active
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003087982A2 (en) * | 2002-04-08 | 2003-10-23 | Cyanea Systems Corp. | Method and system for problem determination in distributed enterprise applications |
WO2013122991A1 (en) * | 2012-02-13 | 2013-08-22 | Antenna Software, Inc. | Integrated mobile application development platform |
WO2015192796A1 (en) * | 2014-06-20 | 2015-12-23 | 中国银联股份有限公司 | Automatic application release method and system based on trusted service manager |
CN105279670A (en) * | 2014-06-20 | 2016-01-27 | 中国银联股份有限公司 | Automatic application publishing method and system based on trusted service management platform |
CN106487775A (en) * | 2015-09-01 | 2017-03-08 | 阿里巴巴集团控股有限公司 | A kind for the treatment of method and apparatus of the business datum based on cloud platform |
CN106647560A (en) * | 2016-11-23 | 2017-05-10 | 中国南方电网有限责任公司 | Mobile application unified management method |
CN108183915A (en) * | 2018-01-15 | 2018-06-19 | 中国科学院信息工程研究所 | It is a kind of to realize frame towards the safety label of high safety grade business and application demand |
CN109873834A (en) * | 2019-03-22 | 2019-06-11 | 云南电网有限责任公司 | A kind of enterprise-level cloud mobile application unified platform and system based on cloud computing |
CN112783384A (en) * | 2019-11-08 | 2021-05-11 | 荣耀终端有限公司 | Control method for cloud application operation and electronic equipment |
CN111539775A (en) * | 2020-05-07 | 2020-08-14 | 网易(杭州)网络有限公司 | Application program management method and device |
CN111738296A (en) * | 2020-05-22 | 2020-10-02 | 广东科学技术职业学院 | One-stop service platform based on data fusion |
CN111708698A (en) * | 2020-06-16 | 2020-09-25 | 中国银行股份有限公司 | Application program simulation filing method and related device |
CN112068807A (en) * | 2020-07-17 | 2020-12-11 | 石化盈科信息技术有限责任公司 | Process industrial application software ecosystem, development method and storage medium |
CN111932343A (en) * | 2020-08-14 | 2020-11-13 | 深圳市泽汇科技有限公司 | Automatic product shelf loading management method, device, equipment and storage medium |
CN112153425A (en) * | 2020-09-03 | 2020-12-29 | 河南网络广播电视台有限公司 | Broadcast control management system |
CN112256588A (en) * | 2020-11-10 | 2021-01-22 | 广州掌动智能科技有限公司 | Resource allocation method for application program test, computer readable storage medium and tester |
CN112380522A (en) * | 2020-11-11 | 2021-02-19 | 深圳供电局有限公司 | Management system and method for integrated service mobile application |
CN113568970A (en) * | 2021-02-03 | 2021-10-29 | 腾讯科技(深圳)有限公司 | Application service data management method, device, equipment and storage medium |
CN113296744A (en) * | 2021-05-21 | 2021-08-24 | 建信金融科技有限责任公司 | Application development system and method |
Non-Patent Citations (2)
Title |
---|
"Design of Mobile Application Lifecycle Security Management Platform";Y. Zeng等;《2021 International Conference on Computer Network, Electronic and Automation (ICCNEA)》;20211119;全文 * |
面向企业的移动信息化整体解决方案;徐隆龙;李莹;胡博;;计算机系统应用;20141215(12);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN115021951A (en) | 2022-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9137096B1 (en) | Policy based network compliance | |
CN111935165B (en) | Access control method, device, electronic device and medium | |
US11582242B2 (en) | System, computer program product and method for risk evaluation of API login and use | |
US8666894B1 (en) | Systems and methods for remotely authenticating credit card transactions | |
US8561144B2 (en) | Enforcing security based on a security state assessment of a mobile device | |
US20060020816A1 (en) | Method and system for managing authentication attempts | |
EP3195174B1 (en) | Conditional access to services based on device claims | |
JP2005526311A (en) | Method and apparatus for monitoring a database system | |
CN112818328A (en) | Multi-system authority management method, device, equipment and storage medium | |
US9832184B2 (en) | Controls and administration of privileged accounts system | |
US9635017B2 (en) | Computer network security management system and method | |
KR20100133713A (en) | Database security system, server and method which can protect user's access to database through application | |
KR20100002592A (en) | Method for accounting information security, computer-readable medium for storing a program for executing the method, and system for preforming the same | |
KR101768942B1 (en) | System and method for secure authentication to user access | |
JP4843546B2 (en) | Information leakage monitoring system and information leakage monitoring method | |
CN116633594B (en) | Flamingo gateway security system | |
CN115021951B (en) | Business application management method and system | |
CN111030997A (en) | Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium | |
CN117195168A (en) | Abnormal access identification method and device | |
CN116996238A (en) | Processing method and related device for network abnormal access | |
JP4175574B1 (en) | Management system, management server, and management program | |
KR20040040412A (en) | Management System and method of Social Security number | |
JP2020095750A (en) | Business information protection device, business information protection method, and program | |
CN118364489A (en) | Authority verification method, device, equipment and storage medium | |
CN116866032A (en) | Privilege account management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |