CN110995699A - Unified management and control method, management and control end, client and equipment for network security - Google Patents

Unified management and control method, management and control end, client and equipment for network security Download PDF

Info

Publication number
CN110995699A
CN110995699A CN201911207466.8A CN201911207466A CN110995699A CN 110995699 A CN110995699 A CN 110995699A CN 201911207466 A CN201911207466 A CN 201911207466A CN 110995699 A CN110995699 A CN 110995699A
Authority
CN
China
Prior art keywords
configuration
information
client
authority
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911207466.8A
Other languages
Chinese (zh)
Inventor
陈本峰
冀托
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Clouddeep Internet Beijing Technology Co ltd
Original Assignee
Clouddeep Internet Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Clouddeep Internet Beijing Technology Co ltd filed Critical Clouddeep Internet Beijing Technology Co ltd
Priority to CN201911207466.8A priority Critical patent/CN110995699A/en
Publication of CN110995699A publication Critical patent/CN110995699A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Automation & Control Theory (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a unified management and control method for network security, a management and control end, a client and equipment, wherein the method is used for the management and control end and comprises the following steps: receiving login information sent by a client, wherein the login information comprises user identity information; searching configuration authority information corresponding to the login information in a user authority configuration list according to the login information; sending the configuration permission information to the client to configure the client according to the configuration permission information; the management and control method provided by the embodiment of the invention can carry out automatic authority and configuration setting on the client, and the client where the user is located can be configured by finding the corresponding configuration authority information as long as the user logs in the client, so that the configuration time of the user is saved, the authority and the configuration of the client of enterprise personnel are effectively managed, and the management and control method is convenient and fast.

Description

Unified management and control method, management and control end, client and equipment for network security
Technical Field
The embodiment of the invention relates to the technical field of information security, in particular to a unified management and control method, a management and control end, a client and equipment for network security.
Background
With the continuous development of network technology, more and more business processing systems exist in enterprises, and with the popularization of mobile office and cloud-on-enterprise, personnel in the enterprises generally need to access the business processing systems in the intranet through a browser of an external network to acquire resource data, while different enterprise personnel have different permissions, and for large-scale enterprises, the permissions and configuration management of client sides of the enterprise personnel are extremely complex.
Therefore, how to provide a technical scheme to effectively manage the permissions and configurations of the clients of the enterprise personnel, which is convenient and fast is a technical problem to be solved by the technical personnel in the field.
Disclosure of Invention
Therefore, the embodiment of the invention provides a unified management and control method, a management and control end, a client and equipment for network security, which can effectively manage the authority and configuration of the client of the enterprise personnel, and are convenient and quick.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a unified management and control method for network security, where the method is used at a management and control end, and includes:
receiving login information sent by a client, wherein the login information comprises user identity information;
searching configuration authority information corresponding to the login information in a user authority configuration list according to the login information;
sending the configuration permission information to the client to configure the client according to the configuration permission information;
the user authority configuration list is used for storing users and authority configuration information corresponding to the users.
Preferably, the configuration right information includes: a combination of at least one of browser home page settings, plug-in settings, parameter settings, trusted network link settings, kernel configurations, popup configurations, and authorized applications.
Preferably, the searching for the configuration authority information corresponding to the login information in the user authority configuration list according to the login information includes:
analyzing the login information to obtain a user identity code;
searching a target user in the user authority configuration list by using the user identity code;
and determining the authority configuration item corresponding to the target user as configuration authority information.
In a second aspect, an embodiment of the present invention provides a unified management and control method for network security, where the method is used for a client, and includes:
responding to login input of a user, sending login information of the user to a control end, so that the control end searches configuration authority information corresponding to the login information in a user authority configuration list according to the login information; sending the configuration permission information to the client to configure the client according to the configuration permission information;
receiving configuration authority information sent by a control end;
configuring the client according to the configuration authority information;
wherein the login information comprises user identity information; the user authority configuration list is used for storing the user and the authority configuration corresponding to the user.
Preferably, the configuring the client according to the configuration permission information includes:
setting a browser home page of the client as a webpage link in the configuration permission information;
downloading and installing the plug-in according to the plug-in list in the configuration authority information;
setting parameters of a client to be parameters in the configuration permission information;
setting a webpage link in the configuration authority information as a trusted network link;
setting the kernel in the configuration permission information as the kernel of the client;
forbidding the client side as a popup list in the configuration permission information;
and allowing the authorized application in the configuration permission information to be used in the client.
In a third aspect, an embodiment of the present invention provides a management and control end, including:
the system comprises a login information receiving module, a login information sending module and a login information sending module, wherein the login information comprises user identity information;
the configuration information searching module is used for searching configuration authority information corresponding to the login information in a user authority configuration list according to the login information;
the configuration information sending module is used for sending the configuration authority information to the client so as to configure the client according to the configuration authority information; the user authority configuration list is used for storing users and authority configuration information corresponding to the users.
In a fourth aspect, an embodiment of the present invention provides a client, including:
the login input module is used for responding to login input of a user and sending login information of the user to the control end, so that the control end can search configuration authority information corresponding to the login information in a user authority configuration list according to the login information; sending the configuration permission information to the client to configure the client according to the configuration permission information;
the configuration information receiving module is used for receiving configuration authority information sent by the control end;
the configuration information execution module is used for configuring the client according to the configuration authority information; wherein the login information comprises user identity information; the user authority configuration list is used for storing the user and the authority configuration corresponding to the user.
Preferably, the configuration information executing module includes:
the home page setting unit is used for setting a browser home page of the client as a webpage link in the configuration permission information;
the plug-in installation unit is used for downloading and installing the plug-in according to the plug-in list in the configuration authority information;
the parameter setting unit is used for setting the parameters of the client to the parameters in the configuration permission information;
the trusted link setting unit is used for setting the webpage link in the configuration authority information as a trusted network link;
the kernel setting unit is used for setting the kernel in the configuration permission information as the kernel of the client;
a popup setting unit, configured to disable the client to be a popup list in the configuration permission information;
and the application authorization unit is used for allowing the client to use the authorized application in the configuration permission information.
In a fifth aspect, an embodiment of the present invention provides a network security unified management and control device, where the network security unified management and control device includes:
a memory for storing a computer program;
a processor, configured to implement the steps of the unified network security management and control method according to any one of the above first aspects when executing the computer program.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the steps of the network security unified management and control method according to any one of the above first aspects.
The embodiment of the invention provides a unified management and control method for network security, which is used for a management and control end and comprises the following steps: receiving login information sent by a client, wherein the login information comprises user identity information; searching configuration authority information corresponding to the login information in a user authority configuration list according to the login information; sending the configuration permission information to the client to configure the client according to the configuration permission information; the management and control method provided by the embodiment of the invention can carry out automatic authority and configuration setting on the client, so long as the user logs in the client, the corresponding configuration authority information can be found to configure the client where the user is located, the configuration time of the user is saved, and the authority and the configuration of the client of enterprise personnel are effectively managed, so that the management and control method is convenient and quick.
The unified management and control method for network security, the management and control end, the client and the device provided by the embodiment of the invention have the same beneficial effects, and are not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
Fig. 1 is a flow chart of a management and control end of a unified management and control method for network security according to an embodiment of the present invention;
fig. 2 is a management and control end expansion flow chart of a network security unified management and control method according to an embodiment of the present invention;
fig. 3 is a flow chart of a client side of a unified management and control method for network security according to an embodiment of the present invention;
fig. 4 is a client expansion flow chart of a network security unified management and control method according to an embodiment of the present invention;
fig. 5 is a schematic diagram illustrating a structure of a control end according to an embodiment of the present invention;
fig. 6 is a schematic diagram illustrating a client according to an embodiment of the present invention;
fig. 7 is a schematic diagram illustrating a configuration information executing module of a client according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a network security unified management and control device according to an embodiment of the present invention.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 and fig. 2, fig. 1 is a flow chart of a management and control end of a unified management and control method for network security according to an embodiment of the present invention; fig. 2 is a management and control end expansion flow chart of a unified management and control method for network security according to an embodiment of the present invention.
The embodiment of the invention provides a unified management and control method for network security, which is used for a management and control end and comprises the following steps:
step S11: receiving login information sent by a client, wherein the login information comprises user identity information;
step S12: searching configuration authority information corresponding to the login information in a user authority configuration list according to the login information;
step S13: sending the configuration permission information to the client to configure the client according to the configuration permission information;
the user authority configuration list is used for storing users and authority configuration information corresponding to the users.
In the embodiment of the present invention, first, a user needs to log in at a client, and then login information is input, specifically, during login, the user may log in using an account password, or may log in using other authentication manners, such as CA certificate, fingerprint authentication, facial feature authentication, and the like, where the login information needs to include identity information of the user, so that the user may subsequently use the identity information of the user to perform corresponding query of configuration authority information, and specifically, in order to query the configuration authority information, a user authority configuration list may be set at the control end, where the user authority configuration list is used to store the user and authority configuration information corresponding to the user.
Therefore, the configuration of various aspects of the client can be performed on the logged-in user according to the user authority configuration list, for example, the configuration authority information that can be performed may include: a combination of at least one of browser home page settings, plug-in settings, parameter settings, trusted network link settings, kernel configurations, popup configurations, and authorized applications. Of course, other content capable of configuring the client may be possible, such as content of the client's layout, color, style, and the like.
Further, in an embodiment, in order to search the configuration authority information corresponding to the login information in the user authority configuration list according to the login information, the following steps may be specifically performed:
step S21: analyzing the login information to obtain a user identity code;
step S22: searching a target user in the user authority configuration list by using the user identity code;
step S23: and determining the authority configuration item corresponding to the target user as configuration authority information.
That is to say, the identity code of the user is determined according to the login information, generally, if the login information used is an account password, for example, a mobile phone number can be used as an account, the mobile phone number has uniqueness, so that the identity code of the user can be determined, and the user identity code with uniqueness is searched in a user permission configuration list to find a target user; and determining the authority configuration item corresponding to the target user as configuration authority information.
The embodiment of the invention provides a unified management and control method for network security, which can automatically set the authority and configuration of a client, and can search corresponding configuration authority information to configure the client where a user is located as long as the user logs in at the client, so that the configuration time of the user is saved, the authority and configuration of the client of enterprise personnel are effectively managed, and convenience and rapidness are realized.
Referring to fig. 3 and fig. 4, fig. 3 is a flowchart of a client side of a unified management and control method for network security according to an embodiment of the present invention; fig. 4 is a flowchart of client expansion of a method for uniformly managing and controlling network security according to an embodiment of the present invention.
As another aspect of the one-sided writing, the present embodiment illustrates a client. The embodiment of the invention provides a unified management and control method for network security, which is used for a client and comprises the following steps:
step S31: responding to login input of a user, sending login information of the user to a control end, so that the control end searches configuration authority information corresponding to the login information in a user authority configuration list according to the login information; sending the configuration permission information to the client to configure the client according to the configuration permission information;
step S32: receiving configuration authority information sent by a control end;
step S33: configuring the client according to the configuration authority information;
wherein the login information comprises user identity information; the user authority configuration list is used for storing the user and the authority configuration corresponding to the user.
In the embodiment of the present invention, a user needs to log in at a client, and at this time, login information is input, specifically, during login, the user may log in using an account password, or may log in using other authentication manners, such as a CA certificate, fingerprint authentication, facial feature authentication, and the like, where the login information includes identity information of the user, so that a corresponding query of configuration authority information may be performed using the identity information of the user in the following. For the specific steps of the control end, reference may be made to the above embodiments.
Therefore, the configuration of various aspects of the client can be performed on the logged-in user according to the user authority configuration list, for example, the configuration authority information that can be performed may include: a combination of at least one of browser home page settings, plug-in settings, parameter settings, trusted network link settings, kernel configurations, popup configurations, and authorized applications. Of course, other content capable of configuring the client may be possible, such as content of the client's layout, color, style, and the like.
Specifically, in order to configure the client according to the configuration permission information, the following steps may be performed:
step S41: setting a browser home page of the client as a webpage link in the configuration permission information;
step S42: downloading and installing the plug-in according to the plug-in list in the configuration authority information;
step S43: setting parameters of a client to be parameters in the configuration permission information;
step S44: setting a webpage link in the configuration authority information as a trusted network link;
step S45: setting the kernel in the configuration permission information as the kernel of the client;
step S46: forbidding the client side as a popup list in the configuration permission information;
step S47: and allowing the authorized application in the configuration permission information to be used in the client.
That is, the client can perform automatic setting according to specific contents in the configuration right information without manual configuration by the user. In practical application, a manager can control the client through the control end, so that the manager is convenient, the operation of the user on the client is simplified, and the user can complete automatic configuration on the client only by logging in the client.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating a structure of a control node according to an embodiment of the present invention.
The embodiment of the present invention provides a management and control terminal 500, including:
a login information receiving module 510, configured to receive login information sent by a client, where the login information includes user identity information;
a configuration information searching module 520, configured to search, according to the login information, configuration authority information corresponding to the login information in a user authority configuration list;
a configuration information sending module 530, configured to send the configuration permission information to the client, so as to configure the client according to the configuration permission information; the user authority configuration list is used for storing users and authority configuration information corresponding to the users.
Referring to fig. 6 and 7, fig. 6 is a schematic diagram illustrating a client according to an embodiment of the present invention; fig. 7 is a schematic diagram illustrating a configuration information executing module of a client according to an embodiment of the present invention.
An embodiment of the present invention provides a client 600, including:
the login input module 610 is configured to send login information of a user to a control end in response to a login input of the user, so that the control end searches configuration permission information corresponding to the login information in a user permission configuration list according to the login information; sending the configuration permission information to the client to configure the client according to the configuration permission information;
a configuration information receiving module 620, configured to receive configuration permission information sent by the control end;
a configuration information executing module 630, configured to configure the client according to the configuration permission information; wherein the login information comprises user identity information; the user authority configuration list is used for storing the user and the authority configuration corresponding to the user.
Preferably, the configuration information executing module 630 includes:
a home page setting unit 631, configured to set a browser home page of the client as a web page link in the configuration permission information;
a plug-in installation unit 632, configured to download and install a plug-in according to the plug-in list in the configuration authority information;
a parameter setting unit 633, configured to set a parameter of a client to a parameter in the configuration permission information;
a trusted link setting unit 634, configured to set a web link in the configuration authority information as a trusted network link;
a kernel setting unit 635, configured to set a kernel in the configuration permission information as a kernel of the client;
a popup setting unit 636, configured to disable a popup list in the configuration permission information in the client;
an application authorization unit 637 configured to allow, in the client, use of an authorized application in the configuration right information.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a network security unified management and control device according to an embodiment of the present invention.
The embodiment of the present invention provides a unified management and control device 800 for network security, including:
a memory 810 for storing a computer program;
a processor 820, configured to implement the steps of the network security unified management and control method according to any one of the above embodiments when executing the computer program.
The embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the unified management and control method for network security according to any of the above embodiments are implemented.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A unified management and control method for network security is used for a management and control end, and is characterized by comprising the following steps:
receiving login information sent by a client, wherein the login information comprises user identity information;
searching configuration authority information corresponding to the login information in a user authority configuration list according to the login information;
sending the configuration permission information to the client to configure the client according to the configuration permission information;
the user authority configuration list is used for storing users and authority configuration information corresponding to the users.
2. The method according to claim 1, wherein the network security management and control method comprises,
the configuration authority information comprises: a combination of at least one of browser home page settings, plug-in settings, parameter settings, trusted network link settings, kernel configurations, popup configurations, and authorized applications.
3. The unified management and control method for network security according to claim 1 or 2,
the searching for the configuration authority information corresponding to the login information in the user authority configuration list according to the login information comprises the following steps:
analyzing the login information to obtain a user identity code;
searching a target user in the user authority configuration list by using the user identity code;
and determining the authority configuration item corresponding to the target user as configuration authority information.
4. A unified management and control method for network security is used for a client, and is characterized by comprising the following steps:
responding to login input of a user, sending login information of the user to a control end, so that the control end searches configuration authority information corresponding to the login information in a user authority configuration list according to the login information; sending the configuration permission information to the client to configure the client according to the configuration permission information;
receiving configuration authority information sent by a control end;
configuring the client according to the configuration authority information;
wherein the login information comprises user identity information; the user authority configuration list is used for storing the user and the authority configuration corresponding to the user.
5. The method according to claim 4, wherein the network security management and control method further comprises,
the configuring the client according to the configuration permission information includes:
setting a browser home page of the client as a webpage link in the configuration permission information;
downloading and installing the plug-in according to the plug-in list in the configuration authority information;
setting parameters of a client to be parameters in the configuration permission information;
setting a webpage link in the configuration authority information as a trusted network link;
setting the kernel in the configuration permission information as the kernel of the client;
forbidding the client side as a popup list in the configuration permission information;
and allowing the authorized application in the configuration permission information to be used in the client.
6. A management and control terminal, comprising:
the system comprises a login information receiving module, a login information sending module and a login information sending module, wherein the login information comprises user identity information;
the configuration information searching module is used for searching configuration authority information corresponding to the login information in a user authority configuration list according to the login information;
the configuration information sending module is used for sending the configuration authority information to the client so as to configure the client according to the configuration authority information; the user authority configuration list is used for storing users and authority configuration information corresponding to the users.
7. A client, comprising:
the login input module is used for responding to login input of a user and sending login information of the user to the control end, so that the control end can search configuration authority information corresponding to the login information in a user authority configuration list according to the login information; sending the configuration permission information to the client to configure the client according to the configuration permission information;
the configuration information receiving module is used for receiving configuration authority information sent by the control end;
the configuration information execution module is used for configuring the client according to the configuration authority information; wherein the login information comprises user identity information; the user authority configuration list is used for storing the user and the authority configuration corresponding to the user.
8. The client of claim 7,
the configuration information execution module comprises:
the home page setting unit is used for setting a browser home page of the client as a webpage link in the configuration permission information;
the plug-in installation unit is used for downloading and installing the plug-in according to the plug-in list in the configuration authority information;
the parameter setting unit is used for setting the parameters of the client to the parameters in the configuration permission information;
the trusted link setting unit is used for setting the webpage link in the configuration authority information as a trusted network link;
the kernel setting unit is used for setting the kernel in the configuration permission information as the kernel of the client;
a popup setting unit, configured to disable the client to be a popup list in the configuration permission information;
and the application authorization unit is used for allowing the client to use the authorized application in the configuration permission information.
9. The utility model provides a unified management and control equipment of network security which characterized in that includes:
a memory for storing a computer program;
a processor for implementing the steps of the network security unified management and control method according to any one of claims 1 to 3 when executing the computer program.
10. A computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when being executed by a processor, the computer program implements the steps of the network security unified management and control method according to any one of claims 1 to 3.
CN201911207466.8A 2019-11-29 2019-11-29 Unified management and control method, management and control end, client and equipment for network security Pending CN110995699A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911207466.8A CN110995699A (en) 2019-11-29 2019-11-29 Unified management and control method, management and control end, client and equipment for network security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911207466.8A CN110995699A (en) 2019-11-29 2019-11-29 Unified management and control method, management and control end, client and equipment for network security

Publications (1)

Publication Number Publication Date
CN110995699A true CN110995699A (en) 2020-04-10

Family

ID=70088753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911207466.8A Pending CN110995699A (en) 2019-11-29 2019-11-29 Unified management and control method, management and control end, client and equipment for network security

Country Status (1)

Country Link
CN (1) CN110995699A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083527A (en) * 2006-06-02 2007-12-05 鸿富锦精密工业(深圳)有限公司 User operation authority centralized management system and method
US20170041310A1 (en) * 2014-04-15 2017-02-09 Huawei Technologies Co., Ltd. Rights control method, client, and server
CN107679417A (en) * 2017-10-09 2018-02-09 郑州云海信息技术有限公司 A kind of method and system of user's operating right management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083527A (en) * 2006-06-02 2007-12-05 鸿富锦精密工业(深圳)有限公司 User operation authority centralized management system and method
US20170041310A1 (en) * 2014-04-15 2017-02-09 Huawei Technologies Co., Ltd. Rights control method, client, and server
CN107679417A (en) * 2017-10-09 2018-02-09 郑州云海信息技术有限公司 A kind of method and system of user's operating right management

Similar Documents

Publication Publication Date Title
US10848520B2 (en) Managing access to resources
US10454942B2 (en) Managed clone applications
CN108427886B (en) Method, system, device and readable medium for setting access authority of application program
US10165007B2 (en) Securing data usage in computing devices
US9805209B2 (en) Systems and methodologies for managing document access permissions
US20120144501A1 (en) Regulating access to protected data resources using upgraded access tokens
US20140173720A1 (en) System and method for controlling the on and off state of features at runtime
US9189643B2 (en) Client based resource isolation with domains
CN110971646A (en) Cluster control device, system and method
CN108289080B (en) Method, device and system for accessing file system
CN113536326A (en) Decentralized cooperative office method, equipment and medium
US9665732B2 (en) Secure Download from internet marketplace
CN106878252B (en) Method for establishing password-free login relationship, method for clearing account and device thereof
CN114692172A (en) User request processing method and device
CN116860699A (en) File management method, system, computer device and computer readable storage medium
CN111193710A (en) Multi-application login method and device based on browser
CN110830459A (en) Stealth security agent access method, gateway terminal, client and equipment
CN109542401B (en) Web development method and device, storage medium and processor
CN110995699A (en) Unified management and control method, management and control end, client and equipment for network security
CN111090839B (en) Resource operation authority management method and device, electronic equipment and storage medium
US12015606B2 (en) Virtual machine provisioning and directory service management
US11757976B2 (en) Unified application management for heterogeneous application delivery
CN113792275A (en) Password updating method and device, storage medium and electronic equipment
CN111970286A (en) User login method and device and web server
CN111865612A (en) Identity authentication method and device for power Internet of things terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200410

RJ01 Rejection of invention patent application after publication