Enterprise safety management method, equipment and system

An enterprise security management and enterprise technology, applied in the field of enterprise security management, can solve the problems of increasing the hidden danger of enterprise information security, increasing the risk of leaking enterprise sensitive information, and unable to fully guarantee the security control of mobile terminals.

Active Publication Date: 2016-10-05
XIANGYANG BRANCH CHINA MOBILE GRP HUBEI CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of enterprise informatization and mobile office, mobile terminals have gradually become an important device for handling enterprise business. Therefore, the security control of mobile terminals has become an important aspect of enterprise information security management. Currently, the IP address of mobile terminals, The security management method of binding the business processing account such as the MAC address to realize the security control of the mobile terminal, but the mobility of the mobile terminal at any time and the complexity of the environment where the mobile terminal is located will cause the current security management method to be unable to comprehensively Ensure the security control of mobile terminals, thereby increasing the security risks of enterprise information; and the enterprise-related data cached by mobile terminals in the process of processing enterprise business contains too much sensitive information of enterprises, which increases the time for mobile terminals to process enterprise business. The risk of leaking sensitive corporate information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise safety management method, equipment and system
  • Enterprise safety management method, equipment and system
  • Enterprise safety management method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0049] see figure 1 , which shows an application scenario of the technical solution of the embodiment of the present invention, in which a security server 1 and a mobile terminal 2 for processing enterprise business are included; the basic idea of ​​the embodiment of the present invention is: the security server 1 Combining the unchangeable hardware information of the mobile terminal 2 itself and the current real-time environment information of the mobile terminal 2 to control the access of the mobile terminal 2 for enterprise business processing; The enterprise-related data cached in the business processing process is controlled, so that not only can the security control of the mobile terminal 1 be carried out in an all-round way, reduce the security risks of enterprise infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an enterprise safety management method, equipment and system. The enterprise safety management method comprises the steps: when a mobile terminal requests to access an enterprise network, acquiring the hardware information, the real time environment information and the authentication information of the mobile terminal by means of a safety server; correspondingly matching the acquired hardware information, real time environment information and authentication information of the mobile terminal with the pre-stored hardware information, real time environment information and authentication information of the mobile terminal; when at least one item of the hardware information, real time environment information and authentication information, acquired by the safety server, of the mobile terminal is not matched with the pre-stored hardware information, real time environment information and authentication information of the mobile terminal, rejecting the mobile terminal to access the enterprise network; when all the hardware information, real time environment information and authentication information, acquired by the safety server, of the mobile terminal are matched with the pre-stored hardware information, real time environment information and authentication information of the mobile terminal, allowing the mobile terminal to access the enterprise network.

Description

technical field [0001] The present invention relates to information security technology, in particular to a method, device and system for enterprise security management. Background technique [0002] With the development of enterprise informatization and mobile office, mobile terminals have gradually become an important device for handling enterprise business. Therefore, the security control of mobile terminals has become an important aspect of enterprise information security management. Currently, the IP address of mobile terminals, The security management method of binding the business processing account such as the MAC address to realize the security control of the mobile terminal, but the mobility of the mobile terminal at any time and the complexity of the environment where the mobile terminal is located will cause the current security management method to be unable to comprehensively Ensure the security control of mobile terminals, thereby increasing the security risks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08
Inventor 李林
Owner XIANGYANG BRANCH CHINA MOBILE GRP HUBEI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products