CN110753025B - Big data security access control method - Google Patents

Big data security access control method Download PDF

Info

Publication number
CN110753025B
CN110753025B CN201910025394.9A CN201910025394A CN110753025B CN 110753025 B CN110753025 B CN 110753025B CN 201910025394 A CN201910025394 A CN 201910025394A CN 110753025 B CN110753025 B CN 110753025B
Authority
CN
China
Prior art keywords
equipment
network access
current
electromagnetic leakage
leakage value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910025394.9A
Other languages
Chinese (zh)
Other versions
CN110753025A (en
Inventor
陈庆梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinrun Ark Technology Co.,Ltd.
Original Assignee
Jinrun Ark Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinrun Ark Technology Co ltd filed Critical Jinrun Ark Technology Co ltd
Priority to CN201910025394.9A priority Critical patent/CN110753025B/en
Publication of CN110753025A publication Critical patent/CN110753025A/en
Application granted granted Critical
Publication of CN110753025B publication Critical patent/CN110753025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R29/00Arrangements for measuring or indicating electric quantities not covered by groups G01R19/00 - G01R27/00
    • G01R29/08Measuring electromagnetic field characteristics
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R33/00Arrangements or instruments for measuring magnetic variables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Condensed Matter Physics & Semiconductors (AREA)
  • Electromagnetism (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a big data security access control method, which comprises the following steps of operating a big data security access control system to control the big data security access, wherein the big data security access control system comprises: the request receiving equipment is arranged in the mobile terminal and used for receiving a login request instruction sent by a preset APP when a user inputs a user name and a login password to log in the preset APP running on the mobile terminal; and the hardware analysis equipment is used for accessing the current CPU model of the mobile terminal to obtain corresponding CPU model information when the login request instruction is received. The big data security access control system is safe, reliable and convenient to use.

Description

Big data security access control method
Technical Field
The invention relates to the field of network security, in particular to a big data security access control method.
Background
The network security refers to that the hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates, and the network service is not interrupted.
From the perspective of network operation and managers, it is desirable to protect and control the operations of accessing, reading and writing information of local network, avoid the threats of 'trapdoor', virus, illegal access, denial of service, illegal occupation and illegal control of network resources, and prevent and defend the attack of network hackers. For security and secrecy departments, the departments hope to filter and prevent the illegal, harmful or confidential information related to the country, avoid the leakage of confidential information, avoid the harm to the society and cause huge loss to the country.
Disclosure of Invention
According to an aspect of the present invention, there is provided a big data security access control method, the method including operating a big data security access control system to control big data security access, the big data security access control system including:
The request receiving equipment is arranged in the mobile terminal and used for receiving a login request instruction sent by a preset APP when a user inputs a user name and a login password to log in the preset APP running on the mobile terminal;
The hardware analysis equipment is arranged in the mobile terminal, is connected with the request receiving equipment and is used for accessing the current CPU model of the mobile terminal to obtain corresponding CPU model information when receiving the login request instruction;
The network access equipment is arranged on one side of the hardware analysis equipment and used for searching one or more CPU models bound with a user input user name from a network to be used as one or more safe CPU models when the login request instruction is received;
The data matching equipment is respectively connected with the hardware analysis equipment and the network access equipment and is used for matching the received CPU model information with the one or more safe CPU models, and when the safe CPU models are matched, an authorized login instruction is sent out, otherwise, a login prohibition instruction is sent out;
The leakage measuring equipment is respectively connected with the currently unused suspension pins of the network access equipment, the hardware analysis equipment and the data matching equipment so as to obtain a current electromagnetic leakage value of the currently unused suspension pins of the network access equipment, a current electromagnetic leakage value of the currently unused suspension pins of the hardware analysis equipment and a current electromagnetic leakage value of the currently unused suspension pins of the data matching equipment;
the CP L D device is connected with the leakage measuring equipment and used for receiving a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and a current electromagnetic leakage value of a current unused suspension pin of the data matching equipment, and performing weighted mean operation on the current electromagnetic leakage value of the current unused suspension pin of the network access equipment, the current electromagnetic leakage value of the current unused suspension pin of the hardware analysis equipment and the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment to obtain a reference pin electromagnetic leakage value, and the CP L D device is further used for multiplying the obtained reference pin electromagnetic leakage value by a weighing factor to obtain a silicon wafer entity electromagnetic leakage value of the network access equipment;
The SD memory chip is used for pre-storing a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and three weight values of the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment which respectively participate in weighted mean calculation;
the gear adjusting equipment is respectively connected with the network access equipment and the CP L D device and is used for determining a corresponding down-regulation target gear according to a silicon wafer entity electromagnetic leakage value to realize adjustment of a working gear of the network access equipment when the received silicon wafer entity electromagnetic leakage value exceeds a limited amount, wherein the larger the silicon wafer entity electromagnetic leakage value is, the lower the corresponding down-regulation target gear is;
In the SD memory chip, the current electromagnetic leakage value of the currently unused suspension pin of the network access device, the current electromagnetic leakage value of the currently unused suspension pin of the hardware analysis device and the current electromagnetic leakage value of the currently unused suspension pin of the data matching device are different in size, wherein the three weight values respectively participate in weighted mean calculation;
The speed adjusting device is further used for executing the downward adjustment executing operation of the current data processing speed of the network access device based on the operation speed downward adjustment multiple;
When the preset APP receives the login prohibition instruction, prohibiting a user from accessing data related to a user name input by the user;
The network access equipment searches one or more CPU models bound with a user input user name from a remote server of a preset APP supplier on the network to serve as one or more safe CPU models.
The invention has at least the following three important points:
(1) One or more CPU models bound with a user input user name are adopted as one or more safe CPU models to carry out access safety control on a preset APP;
(2) Automatically distributing the current residual electric quantity according to the historical power consumption level of each device so as to effectively prolong the service time of each device;
(3) And carrying out targeted estimation on the electromagnetic leakage value of the silicon wafer entity of the equipment so as to adjust the working gear of the equipment based on the estimation result, thereby achieving balance between the working effect and the reduction of electromagnetic leakage.
The big data security access control system is safe, reliable and convenient to use. One or more CPU models bound with a user input user name are adopted to serve as one or more safe CPU models to carry out preset APP access safety control, and meanwhile, the current residual electric quantity is automatically distributed according to the historical power consumption level of each device, so that the service time of each device is effectively prolonged.
Drawings
Embodiments of the invention will now be described with reference to the accompanying drawings, in which:
Fig. 1 is a schematic diagram illustrating an arrangement of a mobile terminal interface APP in a big data security access control system according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
Generally, app files are cracked patch files of certain software, namely files that can change unregistered software into registered software. The method for cracking by using the app generally comprises the following steps: the method comprises the steps of copying an app file carried by certain software together into a memory card through a data line or other modes by using a file management program (such as file power), installing a main program, opening file manager software such as FileMan software, finding the app file in the memory card, editing and copying the app file, finding system-apps in a software installation directory, editing and pasting the app file in a software folder, prompting whether the original file is covered or not, and completing decryption by selecting 'yes', namely covering the source file with the file, and completing decryption. Currently, APP is referred to as an application.
In the prior art, one or more CPU models bound with a user input user name cannot be adopted as one or more safe CPU models to perform preset APP access safety control, the current residual electric quantity cannot be automatically distributed according to the historical power consumption level of each device, the service time of each device is effectively prolonged, and the targeted estimation on the silicon wafer entity electromagnetic leakage value of the device cannot be performed.
In order to overcome the defects, the invention builds a big data security access control method, which comprises the step of operating a big data security access control system to control the big data security access, wherein the big data security access control system can effectively solve the corresponding technical problems.
Fig. 1 is a schematic diagram illustrating an arrangement of a mobile terminal interface APP in a big data security access control system according to an embodiment of the present invention.
The big data security access control system shown according to the embodiment of the invention comprises:
The request receiving equipment is arranged in the mobile terminal and used for receiving a login request instruction sent by a preset APP when a user inputs a user name and a login password to log in the preset APP running on the mobile terminal;
The hardware analysis equipment is arranged in the mobile terminal, is connected with the request receiving equipment and is used for accessing the current CPU model of the mobile terminal to obtain corresponding CPU model information when receiving the login request instruction;
The network access equipment is arranged on one side of the hardware analysis equipment and used for searching one or more CPU models bound with a user input user name from a network to be used as one or more safe CPU models when the login request instruction is received;
The data matching equipment is respectively connected with the hardware analysis equipment and the network access equipment and is used for matching the received CPU model information with the one or more safe CPU models, and when the safe CPU models are matched, an authorized login instruction is sent out, otherwise, a login prohibition instruction is sent out;
The leakage measuring equipment is respectively connected with the currently unused suspension pins of the network access equipment, the hardware analysis equipment and the data matching equipment so as to obtain a current electromagnetic leakage value of the currently unused suspension pins of the network access equipment, a current electromagnetic leakage value of the currently unused suspension pins of the hardware analysis equipment and a current electromagnetic leakage value of the currently unused suspension pins of the data matching equipment;
the CP L D device is connected with the leakage measuring equipment and used for receiving a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and a current electromagnetic leakage value of a current unused suspension pin of the data matching equipment, and performing weighted mean operation on the current electromagnetic leakage value of the current unused suspension pin of the network access equipment, the current electromagnetic leakage value of the current unused suspension pin of the hardware analysis equipment and the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment to obtain a reference pin electromagnetic leakage value, and the CP L D device is further used for multiplying the obtained reference pin electromagnetic leakage value by a weighing factor to obtain a silicon wafer entity electromagnetic leakage value of the network access equipment;
The SD memory chip is used for pre-storing a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and three weight values of the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment which respectively participate in weighted mean calculation;
the gear adjusting equipment is respectively connected with the network access equipment and the CP L D device and is used for determining a corresponding down-regulation target gear according to a silicon wafer entity electromagnetic leakage value to realize adjustment of a working gear of the network access equipment when the received silicon wafer entity electromagnetic leakage value exceeds a limited amount, wherein the larger the silicon wafer entity electromagnetic leakage value is, the lower the corresponding down-regulation target gear is;
In the SD memory chip, the current electromagnetic leakage value of the currently unused suspension pin of the network access device, the current electromagnetic leakage value of the currently unused suspension pin of the hardware analysis device and the current electromagnetic leakage value of the currently unused suspension pin of the data matching device are different in size, wherein the three weight values respectively participate in weighted mean calculation;
The speed adjusting device is further used for executing the downward adjustment executing operation of the current data processing speed of the network access device based on the operation speed downward adjustment multiple;
When the preset APP receives the login prohibition instruction, prohibiting a user from accessing data related to a user name input by the user;
The network access equipment searches one or more CPU models bound with a user input user name from a remote server of a preset APP supplier on the network to serve as one or more safe CPU models.
Next, a detailed description of the structure of the big data security access control system of the present invention will be further described.
In the big data security access control system:
the request receiving device, the hardware analysis device and the data matching device are respectively realized by PA L chips with different models.
In the big data security access control system, the method further comprises:
And the electric quantity detection equipment is connected with the lithium battery and used for detecting the residual electric quantity of the lithium battery so as to output the residual electric quantity as real-time residual electric quantity.
In the big data security access control system, the method further comprises:
And the first power consumption counting device is connected with the network access device and used for counting the power consumption of the network access device in unit time based on the historical power consumption data of the network access device so as to output the power consumption as the power consumption in the first unit time.
In the big data security access control system, the method further comprises:
And the second power consumption statistical device is connected with the hardware analysis device and used for counting the power consumption of the hardware analysis device in unit time based on the historical power consumption data of the hardware analysis device to be output as the power consumption of the second unit time.
In the big data security access control system, the method further comprises:
And the electric quantity distribution equipment is respectively connected with the electric quantity detection equipment, the first power consumption statistic equipment and the second power consumption statistic equipment and is used for determining the electric quantity distributed to the network access equipment and the electric quantity distributed to the hardware analysis equipment based on the real-time residual electric quantity, the first unit time power consumption and the second unit time power consumption.
In the big data security access control system:
In the power distribution device, determining the amount of power distributed to the network access device and the amount of power distributed to the hardware analysis device based on the real-time residual power amount, the first unit time power consumption amount, and the second unit time power consumption amount includes: the higher the power consumption per unit time, the more power is allocated to the network access device.
In the big data security access control system:
In the power distribution device, determining the amount of power distributed to the network access device and the amount of power distributed to the hardware analysis device based on the real-time residual power amount, the first unit time power consumption amount, and the second unit time power consumption amount includes: the higher the power consumption per unit time, the more power is allocated to the hardware analysis device.
In the big data security access control system:
And when the preset APP receives the authorized login instruction, allowing the user to access data related to the input user name.
in addition, the CP L D has the characteristics of flexible programming, high integration level, short design and development period, wide application range, advanced development tool, low design and manufacturing cost, low requirement on hardware experience of designers, no need of testing standard products, strong confidentiality, popular price and the like, and can realize larger-scale circuit design, so that the CP L D device is widely applied to prototype design and product production (generally less than 10,000 pieces) of products.
the basic design method is to generate corresponding target files by means of integrated development software platform and schematic diagram, hardware description language, etc. and to transmit the codes to the target chip via download cable (programming in system) to realize the designed digital system.
It is to be understood that while the present invention has been described in conjunction with the preferred embodiments thereof, it is not intended to limit the invention to those embodiments. It will be apparent to those skilled in the art from this disclosure that many changes and modifications can be made, or equivalents modified, in the embodiments of the invention without departing from the scope of the invention. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical essence of the present invention are still within the scope of the protection of the technical solution of the present invention, unless the contents of the technical solution of the present invention are departed.

Claims (9)

1. A big data security access control method, the method comprising operating a big data security access control system to control big data security access, the big data security access control system comprising:
The request receiving equipment is arranged in the mobile terminal and used for receiving a login request instruction sent by a preset APP when a user inputs a user name and a login password to log in the preset APP running on the mobile terminal;
The hardware analysis equipment is arranged in the mobile terminal, is connected with the request receiving equipment and is used for accessing the current CPU model of the mobile terminal to obtain corresponding CPU model information when receiving the login request instruction;
The network access equipment is arranged on one side of the hardware analysis equipment and used for searching one or more CPU models bound with a user input user name from a network to be used as one or more safe CPU models when the login request instruction is received;
The data matching equipment is respectively connected with the hardware analysis equipment and the network access equipment and is used for matching the received CPU model information with the one or more safe CPU models, and when the safe CPU models are matched, an authorized login instruction is sent out, otherwise, a login prohibition instruction is sent out;
The leakage measuring equipment is respectively connected with the currently unused suspension pins of the network access equipment, the hardware analysis equipment and the data matching equipment so as to obtain a current electromagnetic leakage value of the currently unused suspension pins of the network access equipment, a current electromagnetic leakage value of the currently unused suspension pins of the hardware analysis equipment and a current electromagnetic leakage value of the currently unused suspension pins of the data matching equipment;
the CP L D device is connected with the leakage measuring equipment and used for receiving a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and a current electromagnetic leakage value of a current unused suspension pin of the data matching equipment, and performing weighted mean operation on the current electromagnetic leakage value of the current unused suspension pin of the network access equipment, the current electromagnetic leakage value of the current unused suspension pin of the hardware analysis equipment and the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment to obtain a reference pin electromagnetic leakage value, and the CP L D device is further used for multiplying the obtained reference pin electromagnetic leakage value by a weighing factor to obtain a silicon wafer entity electromagnetic leakage value of the network access equipment;
The SD memory chip is used for pre-storing a current electromagnetic leakage value of a current unused suspension pin of the network access equipment, a current electromagnetic leakage value of a current unused suspension pin of the hardware analysis equipment and three weight values of the current electromagnetic leakage value of the current unused suspension pin of the data matching equipment which respectively participate in weighted mean calculation;
the gear adjusting equipment is respectively connected with the network access equipment and the CP L D device and is used for determining a corresponding down-regulation target gear according to a silicon wafer entity electromagnetic leakage value to realize adjustment of a working gear of the network access equipment when the received silicon wafer entity electromagnetic leakage value exceeds a limited amount, wherein the larger the silicon wafer entity electromagnetic leakage value is, the lower the corresponding down-regulation target gear is;
In the SD memory chip, the current electromagnetic leakage value of the currently unused suspension pin of the network access device, the current electromagnetic leakage value of the currently unused suspension pin of the hardware analysis device and the current electromagnetic leakage value of the currently unused suspension pin of the data matching device are different in size, wherein the three weight values respectively participate in weighted mean calculation;
The speed adjusting device is used for executing the down-regulation execution operation of the current data processing speed of the network access device based on the operation speed down-regulation multiple;
When the preset APP receives the login prohibition instruction, prohibiting a user from accessing data related to a user name input by the user;
The network access equipment searches one or more CPU models bound with a user input user name from a remote server of a preset APP supplier on the network to serve as one or more safe CPU models.
2. The method of claim 1, wherein:
the request receiving device, the hardware analysis device and the data matching device are respectively realized by PA L chips with different models.
3. The method of claim 2, wherein the system further comprises:
And the electric quantity detection equipment is connected with the lithium battery and used for detecting the residual electric quantity of the lithium battery so as to output the residual electric quantity as real-time residual electric quantity.
4. The method of claim 3, wherein the system further comprises:
And the first power consumption counting device is connected with the network access device and used for counting the power consumption of the network access device in unit time based on the historical power consumption data of the network access device so as to output the power consumption as the power consumption in the first unit time.
5. The method of claim 4, wherein the system further comprises:
And the second power consumption statistical device is connected with the hardware analysis device and used for counting the power consumption of the hardware analysis device in unit time based on the historical power consumption data of the hardware analysis device to be output as the power consumption of the second unit time.
6. The method of claim 5, wherein the system further comprises:
And the electric quantity distribution equipment is respectively connected with the electric quantity detection equipment, the first power consumption statistic equipment and the second power consumption statistic equipment and is used for determining the electric quantity distributed to the network access equipment and the electric quantity distributed to the hardware analysis equipment based on the real-time residual electric quantity, the first unit time power consumption and the second unit time power consumption.
7. The method of claim 6, wherein:
In the power distribution device, determining the amount of power distributed to the network access device and the amount of power distributed to the hardware analysis device based on the real-time residual power amount, the first unit time power consumption amount, and the second unit time power consumption amount includes: the higher the power consumption per unit time, the more power is allocated to the network access device.
8. The method of claim 7, wherein:
In the power distribution device, determining the amount of power distributed to the network access device and the amount of power distributed to the hardware analysis device based on the real-time residual power amount, the first unit time power consumption amount, and the second unit time power consumption amount includes: the higher the power consumption per unit time, the more power is allocated to the hardware analysis device.
9. The method of claim 8, wherein:
And when the preset APP receives the authorized login instruction, allowing the user to access data related to the input user name.
CN201910025394.9A 2019-01-07 2019-01-07 Big data security access control method Active CN110753025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910025394.9A CN110753025B (en) 2019-01-07 2019-01-07 Big data security access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910025394.9A CN110753025B (en) 2019-01-07 2019-01-07 Big data security access control method

Publications (2)

Publication Number Publication Date
CN110753025A CN110753025A (en) 2020-02-04
CN110753025B true CN110753025B (en) 2020-07-24

Family

ID=69275672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910025394.9A Active CN110753025B (en) 2019-01-07 2019-01-07 Big data security access control method

Country Status (1)

Country Link
CN (1) CN110753025B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103178484A (en) * 2011-12-23 2013-06-26 比亚迪股份有限公司 Mobile power source and mobile terminal using same
CN105845998A (en) * 2016-05-03 2016-08-10 珠海市魅族科技有限公司 Display method of charged state and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295384B (en) * 2015-05-21 2020-04-10 ***通信集团重庆有限公司 Big data platform access control method and device and authentication server
CN106445763A (en) * 2016-09-09 2017-02-22 中国南方电网有限责任公司电网技术研究中心 Power distribution and utilization big data platform test method and system
CN108258427B (en) * 2017-12-22 2023-09-15 广东纳睿雷达科技股份有限公司 Hidden feed ridge waveguide slot antenna
CN108881309A (en) * 2018-08-14 2018-11-23 北京奇虎科技有限公司 Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103178484A (en) * 2011-12-23 2013-06-26 比亚迪股份有限公司 Mobile power source and mobile terminal using same
CN105845998A (en) * 2016-05-03 2016-08-10 珠海市魅族科技有限公司 Display method of charged state and terminal

Also Published As

Publication number Publication date
CN110753025A (en) 2020-02-04

Similar Documents

Publication Publication Date Title
CN104462970B (en) A kind of Android application program privilege abuse detection methods based on process communication
KR101558715B1 (en) System and Method for Server-Coupled Malware Prevention
RU2680736C1 (en) Malware files in network traffic detection server and method
EP2501100A1 (en) Quarantine network system and quarantine client
CN105701423B (en) Date storage method and device applied to high in the clouds payment transaction
KR20120018327A (en) Validation and/or authentication of a device for communication with a network
US9589130B2 (en) Application trust-listing security service
CN114553540B (en) Zero trust-based Internet of things system, data access method, device and medium
CN107819743B (en) Resource access control method and terminal equipment
CN106209569A (en) The method for authenticating of a kind of enterprise instant communication and device
CN110753025B (en) Big data security access control method
CN109756499B (en) Big data security access control system
CN110401621A (en) A kind of means of defence of sensitive instructions, equipment and storage medium
US11275823B2 (en) Authority configuration method and device
CN106817385A (en) Cloud terminal network access system based on high speed reliable hardware module
CN106357657B (en) Signing and issuing user management method and device
CN106709369A (en) Data processing method and data processing apparatus for terminal exception
US10116438B1 (en) Managing use of security keys
CN117354060B (en) Method, system and medium for detecting loopholes of cloud computing IaaS layer
CN110096856B (en) Access control method, system, electronic device and medium
CN104796292B (en) Terminal management method and terminal system
CN114610402B (en) Operation authority control method and operation authority configuration method
CN116506238B (en) Electronic equipment information processing system based on data analysis
CN107241420A (en) Document down loading method and device
CN117061243B (en) Terminal-oriented edge zero trust engine, authentication protection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200619

Address after: Room 1, Unit 13-14, Building 1, Zheshang International, Chagu Avenue, Liuwu New District, Lhasa City, Tibet Autonomous Region, 850000

Applicant after: Jinrun Ark Technology Co.,Ltd.

Address before: 210 000 No. 35 Jiangdong Middle Road, Jianye District, Nanjing City, Jiangsu Province

Applicant before: Chen Qingmei

GR01 Patent grant
GR01 Patent grant