A method, device and system for enterprise security management

An enterprise security management and enterprise technology, applied in the field of enterprise security management, can solve the problems of not being able to fully guarantee the security control of mobile terminals, increasing the hidden danger of enterprise information security, and increasing the risk of leaking sensitive information of the enterprise.

Active Publication Date: 2019-06-14
XIANGYANG BRANCH CHINA MOBILE GRP HUBEI CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of enterprise informatization and mobile office, mobile terminals have gradually become an important device for handling enterprise business. Therefore, the security control of mobile terminals has become an important aspect of enterprise information security management. Currently, the IP address of mobile terminals, The security management method of binding the business processing account such as the MAC address to realize the security control of the mobile terminal, but the mobility of the mobile terminal at any time and the complexity of the environment where the mobile terminal is located will cause the current security management method to be unable to comprehensively Ensure the security control of mobile terminals, thereby increasing the security risks of enterprise information; and the enterprise-related data cached by mobile terminals in the process of processing enterprise business contains too much sensitive information of enterprises, which increases the time for mobile terminals to process enterprise business. The risk of leaking sensitive corporate information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for enterprise security management
  • A method, device and system for enterprise security management
  • A method, device and system for enterprise security management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0049] see figure 1 , which shows an application scenario of the technical solution of the embodiment of the present invention, in which a security server 1 and a mobile terminal 2 for processing enterprise business are included; the basic idea of ​​the embodiment of the present invention is: the security server 1 Combining the unchangeable hardware information of the mobile terminal 2 itself and the current real-time environment information of the mobile terminal 2 to control the access of the mobile terminal 2 for enterprise business processing; The enterprise-related data cached in the business processing process is controlled, so that not only can the security control of the mobile terminal 1 be carried out in an all-round way, reduce the security risks of enterprise infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a method, device, and system for enterprise security management. The method includes: when a mobile terminal requests to access the enterprise network, the security server collects hardware information, real-time environment information, and authentication information of the mobile terminal; The collected hardware information, real-time environment information and authentication information of the mobile terminal are respectively matched with the pre-stored hardware information, real-time environment information and authentication information of the mobile terminal; when the hardware information of the mobile terminal collected by the security server, the real-time When at least one of the environmental information and authentication information does not match the pre-stored hardware information, real-time environmental information, and authentication information of the mobile terminal, the mobile terminal is refused to access the enterprise network; when the hardware information of the mobile terminal collected by the security server When the information, real-time environment information, and authentication information match the pre-stored hardware information, environment information, and authentication information of the mobile terminal, the mobile terminal is allowed to access the enterprise network.

Description

technical field [0001] The present invention relates to information security technology, in particular to a method, device and system for enterprise security management. Background technique [0002] With the development of enterprise informatization and mobile office, mobile terminals have gradually become an important device for handling enterprise business. Therefore, the security control of mobile terminals has become an important aspect of enterprise information security management. Currently, the IP address of mobile terminals, The security management method of binding the business processing account such as the MAC address to realize the security control of the mobile terminal, but the mobility of the mobile terminal at any time and the complexity of the environment where the mobile terminal is located will cause the current security management method to be unable to comprehensively Ensure the security control of mobile terminals, thereby increasing the security risks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08
Inventor 李林
Owner XIANGYANG BRANCH CHINA MOBILE GRP HUBEI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products