Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method, device and system used for tamper-proofing privilege management

A technology of authority management and anti-tampering, which is applied in the field of information security, can solve the problems of not meeting the needs of business development, and the inability to meet the close requirements of anti-tampering technology and business, and achieve the effect of high anti-tampering requirements and high security level

Inactive Publication Date: 2017-07-28
CHINA TELECOM CORP LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing anti-tampering technology is isolated from the business in the protection monitoring process and is relatively independent, that is, the anti-tampering technology is weakly related to the business
In the scenario of frequent business updates, the requirements for the close relationship between tamper-proof technology and business cannot be met, and it is increasingly unsuitable for business development needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system used for tamper-proofing privilege management
  • Method, device and system used for tamper-proofing privilege management
  • Method, device and system used for tamper-proofing privilege management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0052] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0053] At the same time, it should be understood that, for the convenience of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and system used for tamper-proofing privilege management. The method used for tamper-proofing privilege management comprises that a business updating module sends a business updating notification to a privilege management module when receiving a business updating trigger message; the privilege management module instructs a tamper-proofing module to open tamper-proofing privilege management when receiving the business updating notification; after the tamper-proofing module opens the tamper-proofing privilege management, the business updating module carries out the business updating process. According to the invention, the tamper-proofing privilege management function and the business process are combined, the problems that the existing tamper-proofing technology and the business are weakly correlated with each other can be effectively solved, the tamper-proofing privilege and the updating process are reasonably combined, and furthermore a higher-security-level tamper-proofing requirement can be achieved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method, device and system for tamper-proof rights management. Background technique [0002] With the development of Internet technology, WEB applications have become more and more extensive and penetrated into various fields. The internal connection of enterprises has become closer and closer, the value of data has become higher and higher, and the frequent occurrence of network security incidents has led to more and more people and enterprises. Pay more attention to network security, especially WEB application security. Although there are security measures such as firewalls and intrusion detection, the complexity and diversity of WEB application systems lead to endless system vulnerabilities, which are hard to detect, and incidents of hackers intruding and tampering with pages occur from time to time. In response to these situations, the webpage anti-tampering system came ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30G06F21/51
CPCG06F21/30G06F21/51
Inventor 徐教强丁鸣嵇建军黄荣谞王雷邱昊杨林刘炜胡陶军陈辰
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products