Disclosure of Invention
The present invention is directed to a method, an apparatus, a computer device, and a computer-readable storage medium for managing a security entity, which can solve the above-mentioned drawbacks in the prior art.
One aspect of the present invention provides a method for managing a security entity, where a storage structure of the security entity is a tree structure, the tree structure includes a plurality of nodes, and each node sets an attribute of the security entity, and the method includes: in response to a management instruction for the security entity, determining an attribute to be managed of the security entity from the management instruction; constructing a query path for querying the attribute to be managed, wherein the query path comprises a plurality of layers with progressive relation; inquiring the tree structure by using the inquiry path, and inquiring nodes for setting the attributes to be managed in the tree structure by using the inquiry path; and managing the attribute to be managed according to the query result.
Optionally, the secure entity has a unique identifier, and the secure entity associates the tree structure through the unique identifier, and constructing a query path for querying the attribute to be managed includes: obtaining the unique identifier; constructing the query path using the unique identifier.
Optionally, the obtaining the unique identifier comprises: judging whether the management instruction carries the unique identifier or not; if the management instruction carries the unique identifier, acquiring the unique identifier from the management instruction; and if the management instruction does not carry the unique identifier, acquiring the unique identifier from the index relationship of the secure entity, wherein the index relationship of the secure entity comprises the relationship between the secure entity and the unique identifier.
Optionally, when the management instruction is a new instruction, the attribute to be managed is an attribute to be newly added, and managing the attribute to be managed according to the query result includes: if the query result is that the node with the attribute to be newly added is queried, error reporting processing is carried out; and if the query result indicates that the node with the attribute to be newly added is not queried, newly adding a node in the tree structure, and storing the attribute to be newly added at the newly added node.
Optionally, when the management instruction is a delete instruction, the attribute to be managed is an attribute to be deleted, and managing the attribute to be managed according to the query result includes: and if the query result is that the node with the attribute to be deleted is queried, deleting the attribute to be deleted at the node with the attribute to be deleted.
Optionally, when the management instruction is a modification instruction, the attribute to be managed is an attribute to be modified, and the method further includes: determining an attribute used for modifying the attribute to be modified from the modification instruction, wherein the attribute is called a substitute attribute; managing the attributes to be managed according to the query result comprises: and if the query result is that the node with the attribute to be modified is queried, modifying the attribute to be modified by using the alternative attribute at the node with the attribute to be modified.
Optionally, modifying the attribute to be modified by using the substitute attribute includes: when the alternate attribute carries a preset identifier, modifying the attribute to be modified by using the alternate attribute; when the alternate attribute does not carry the preset identifier and the attribute to be modified carries the preset identifier, forbidding to modify the attribute to be modified by using the alternate attribute; and when the alternate attribute and the attribute to be modified do not carry the preset identifier, comparing the priorities of the alternate attribute and the attribute to be modified, wherein when the priority of the alternate attribute is greater than or equal to the priority of the attribute to be modified, the attribute to be modified is modified by using the alternate attribute, and when the priority of the alternate attribute is smaller than the priority of the attribute to be modified, the attribute to be modified is forbidden to be modified by using the alternate attribute.
Another aspect of the present invention provides an apparatus for managing a security entity, where a storage structure of the security entity is a tree structure, the tree structure includes a plurality of nodes, and each node sets an attribute of the security entity, and the apparatus includes: the determining module is used for responding to a management instruction aiming at the safety entity and determining the attribute to be managed of the safety entity from the management instruction; the building module is used for building a query path for querying the attribute to be managed, wherein the query path comprises a plurality of layers with progressive relation; the query module is used for querying the tree structure by using the query path and querying the node for setting the attribute to be managed in the tree structure by using the query path; and the management module is used for managing the attribute to be managed according to the query result.
Optionally, the secure entity has a unique identifier, and the secure entity associates the tree structure with the unique identifier, and the construction module is further configured to: obtaining the unique identifier; constructing the query path using the unique identifier.
Optionally, the construction module, when obtaining the unique identifier, is further configured to: judging whether the management instruction carries the unique identifier or not; if the management instruction carries the unique identifier, acquiring the unique identifier from the management instruction; and if the management instruction does not carry the unique identifier, acquiring the unique identifier from the index relationship of the secure entity, wherein the index relationship of the secure entity comprises the relationship between the secure entity and the unique identifier.
Optionally, when the management instruction is a new instruction, the attribute to be managed is an attribute to be added, and the management module is further configured to: if the query result is that the node with the attribute to be newly added is queried, error reporting processing is carried out; and if the query result indicates that the node with the attribute to be newly added is not queried, newly adding a node in the tree structure, and storing the attribute to be newly added at the newly added node.
Optionally, when the management instruction is a delete instruction, the attribute to be managed is an attribute to be deleted, and the management module is further configured to: and if the query result is that the node with the attribute to be deleted is queried, deleting the attribute to be deleted at the node with the attribute to be deleted.
Optionally, when the management instruction is a modification instruction, the attribute to be managed is an attribute to be modified, and the apparatus further includes: the processing module is used for determining an attribute used for modifying the attribute to be modified from the modification instruction, and the attribute is called a substitute attribute; the management module is further configured to: and if the query result is that the node with the attribute to be modified is queried, modifying the attribute to be modified by using the alternative attribute at the node with the attribute to be modified.
Optionally, when the attribute to be modified is modified by using the substitute attribute, the management module is further configured to: when the alternate attribute carries a preset identifier, modifying the attribute to be modified by using the alternate attribute; when the alternate attribute does not carry the preset identifier and the attribute to be modified carries the preset identifier, forbidding to modify the attribute to be modified by using the alternate attribute; and when the alternate attribute and the attribute to be modified do not carry the preset identifier, comparing the priorities of the alternate attribute and the attribute to be modified, wherein when the priority of the alternate attribute is greater than or equal to the priority of the attribute to be modified, the attribute to be modified is modified by using the alternate attribute, and when the priority of the alternate attribute is smaller than the priority of the attribute to be modified, the attribute to be modified is forbidden to be modified by using the alternate attribute.
Yet another aspect of the present invention provides a computer apparatus, comprising: the present invention relates to a secure entity management method, and more particularly, to a secure entity management method, and a secure entity management program.
A further aspect of the present invention provides a computer-readable storage medium on which a computer program is stored, which, when executed by a processor, implements a method of managing a security entity as described in any of the embodiments above.
The management method of the security entity stores each attribute of the security entity on one node, so that the storage structure of the security entity integrally forms a layered tree structure, the structure is clear, the management is convenient, and the child nodes can share the attribute definition of the father node, thereby reducing the repeated definition. When the attributes of the security entity are managed, a query path suitable for the tree structure is constructed, for example, the query path comprises a plurality of layers with progressive relations, then nodes of the tree structure are positioned layer by layer through the query path, and a query result is accurately and quickly obtained, for example, the query result is the node which is set with the attribute to be managed and is queried, or the query result is the node which is not queried and is set with the attribute to be managed, further, the attribute to be managed can be managed according to the query result.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The invention provides a management method of a safety entity, wherein the storage structure of the safety entity is a tree structure, the tree structure comprises a plurality of nodes, and each node is provided with an attribute of the safety entity. Specifically, the attributes of the security entity can be divided into basic attributes, static attributes, dynamic attributes and security attributes, each type of attribute includes a plurality of fine granularity attributes, each type of attribute and each fine granularity attribute occupy a node respectively, and the node occupied by each fine granularity attribute included in each type of attribute is a child node of the node occupied by the type of attribute, and through the distribution, the storage structure of the whole security entity forms a hierarchical tree structure.
Fig. 1 schematically shows a schematic diagram of a tree structure according to an embodiment of the invention. As shown in fig. 1, taking the security entity as a sample file as an example, the storage structure of the sample file is the tree structure in fig. 1. Specifically, the node occupied by each type of attributes in the basic attributes, the static attributes, the dynamic attributes and the security attributes in the sample file attributes is a child node of the node occupied by the sample file attributes. The basic attribute may be information such as a file size and a file type. The static attribute may be a static format of the file, for example, the static attribute may include the following attributes: the node occupied by each attribute under the basic attribute is a child node of the node occupied by the basic attribute; the executable file includes the following attributes: PE (Portable executable) file, ELF (executable and Linking Format) file and Mach-O (Mach object) file, wherein the node occupied by each attribute in the executable file is a child node of the node occupied by the executable file. The dynamic attribute is a dynamic behavior executed by the file, for example, the dynamic attribute may include the following attributes: file behavior, network behavior, registry behavior, and the like, and the node occupied by each attribute under the dynamic attribute is a child node of the node occupied by the dynamic attribute. The security attributes may include reputation information of the file, antivirus software (abbreviated as softening) detection information, security level, and the like, and the node occupied by each attribute under the security attributes is a child node of the node occupied by the security attributes.
Based on the tree structure described in the above embodiment, when managing the attributes to be managed of the security entity, the attributes to be managed can be searched by constructing a query path applicable to the tree structure, and then the attributes to be managed are managed according to the query result. In particular, fig. 2 schematically shows a flow chart of a management method of a security entity according to an embodiment of the present invention. As shown in fig. 2, the method for managing a security entity may include steps S201 to S204, where:
step S201, in response to a management instruction for the secure entity, determining an attribute to be managed of the secure entity from the management instruction.
The security entity is an object actually participating in network security, such as a sample File (File), an IP address, a domain name, a URL (uniform resource locator), a terminal device, a process, a mail, an enterprise, and the like.
In this embodiment, the management instruction may indicate which attribute of which security entity is managed this time, and the indicated attribute may be referred to as an attribute to be managed; the management instruction may also simply indicate which security entity is managed, and all attributes of the security entity are referred to as attributes to be managed.
Step S202, constructing a query path for querying the attribute to be managed, wherein the query path comprises a plurality of layers with progressive relation.
In this embodiment, the query path may be referred to as a Uniform Resource Identifier (URI) and is used to quickly locate the attribute to be managed. Because the storage structure of the security entity is a tree structure with a hierarchical relationship, in order to quickly locate the node for setting the attribute to be managed in the tree structure, the query path can be constructed into a plurality of layers with progressive relationships, so that when searching is performed, the layers in the tree structure can be progressively positioned, wherein the progressive relationships represent the sub-level of the next layer which is the previous layer.
Optionally, several of the layers may be determined by the security entity and the attribute to be managed. For example, the layer determined by the security entity may determine the tree structure corresponding to the security entity, i.e., all data tables storing the attributes of the security entity; the layer determined by the attribute to be managed can quickly locate the node for setting the attribute to be managed from the tree structure, namely, a data table for storing the attribute to be managed is determined from all the determined data tables, and the position of the attribute to be managed in the data table is determined. Wherein, the layer determined by the security entity may be a layer determined by a name of the security entity or information (such as a label) characterizing the security entity, and the layer determined by the attribute to be managed may be a layer determined by a name of the attribute to be managed or information (such as a label) characterizing the attribute to be managed. In addition, since the attribute to be managed is a sub-level of the security entity, the layer determined by the attribute to be managed in the query path is a sub-level of the layer determined by the security entity.
Optionally, the secure entity has a unique identifier, and the secure entity associates the tree structure with the unique identifier, in order to accurately find the tree structure corresponding to the secure entity, the unique identifier of the secure entity needs to be taken into account when constructing the query path, so as to locate the tree structure of the secure entity by the unique identifier. Specifically, step S202 may include step S2021 and step S2022, where:
step S2021, the unique identifier is acquired.
Taking the Secure entity as a sample file as an example, the unique identifier may be a unique value obtained by performing Secure Hash Algorithm 1 (SHA-1) calculation on the sample file: SHA 1.
In this embodiment, two cases may exist in constructing the query path, one case is that the management instruction carries a unique identifier, and the query path may be constructed by directly using the unique identifier, for example, the management instruction manages a PDF file with SHA1 of 90903; in another case, the management instruction does not carry the unique identifier, and the unique identifier needs to be determined from a pre-established index relationship, for example, the management instruction is to manage the PDF file. Specifically, step S2021 may include steps a1 to A3, in which:
step A1, judging whether the management instruction carries the unique identifier.
If the management instruction carries the unique identifier, executing step a 2; if the management command does not carry the unique identifier, step a3 is executed.
Step a2, obtaining the unique identifier from the management instruction.
Step a3, obtaining the unique identifier from the index relationship of the secure entity, wherein the index relationship of the secure entity includes the relationship between the secure entity and the unique identifier.
In this embodiment, an index relationship is established in advance for a part of the secure entities. For example, if the management command is to manage the PDF files arranged in the top 10 by SHA1, the index relationship of the PDFs is found out from all the index relationships, the SHA1 of all the PDFs is found out from the index relationships of all the PDFs, and then the SHA1 is sorted to select the SHA1 arranged in the top 10.
Step S2022, construct the query path using the unique identifier.
Optionally, several of said layers are determined by said secure entity, said unique identifier and said attribute to be managed. When a plurality of tree structures corresponding to security entities of the same type exist (for example, a plurality of sample files exist, and the storage structure of each sample file is a tree structure), the layer determined by the security entities cannot accurately determine the corresponding tree structure, and at this time, the unique identifier can be taken into account when a query path is constructed.
For example, if the security entity is a files file, the attribute to be managed is a static attribute, and the unique identifier is SHA1, the unique identifier may be files/{ SHA1 }/stctic; if the attribute to be managed is a network behavior in the dynamic attribute, the unique identifier may be files/{ sha1 }/behavior/network.
Step S203, querying the tree structure by using the query path, and querying a node in the tree structure for setting the attribute to be managed by using the query path.
In this embodiment, the tree structure of the security entity may be determined by the query path, and then the nodes with the attributes to be managed may be set by continuously querying the tree structure by using the query path.
For example, the management instruction is to manage the network behavior of the dynamic attribute of the security entity 1 (such as files), and the query path is files/{ sha1 }/behavior/network. The tree structure 1 corresponding to the security entity 1, the tree structure 2 corresponding to the security entity 2, and the tree structure 3 corresponding to the security entity 3. Firstly, determining a tree structure 1 through a query path, then determining a node for setting a dynamic attribute in the tree structure 1, and further querying nodes for setting a network behavior in all child nodes of the node for setting the dynamic attribute.
And step S204, managing the attribute to be managed according to the query result.
The management may include searching, adding, deleting and modifying, and the query result may be a node for which the attribute to be managed is set by query, or a node for which the attribute to be managed is set by query.
Optionally, when the management instruction is a new adding instruction, the attribute to be managed is an attribute to be added, and step S104 may include: if the query result is that the node with the attribute to be newly added is queried, error reporting processing is carried out; and if the query result indicates that the node with the attribute to be newly added is not queried, newly adding a node in the tree structure, and storing the attribute to be newly added at the newly added node.
In this embodiment, when an attribute is added, if a node for setting the attribute to be added is found in the tree structure, it is inevitable that an error exists at a certain position, and the system can report the error. If the node for setting the attribute to be newly added is not queried in the tree structure, a node can be newly added in the tree structure, which specifically can be: deleting the last layer in the query path to obtain a deleted query path; locating the corresponding node in the tree structure by using the deleted query path; and creating a child node for the positioned node, and storing the attribute to be added at the created child node. The last layer of the query path is deleted to determine the attribute of the previous level of the attribute to be newly added, then the node of the attribute of the previous level of the attribute to be newly added is positioned and set in the tree structure by utilizing the deleted query path, child nodes are further created for the positioned nodes, then the attribute to be newly added is stored at the created child nodes, and the purpose of adding the attribute can be achieved.
Optionally, when the management instruction is a delete instruction, the attribute to be managed is an attribute to be deleted, and managing the attribute to be managed according to the query result includes: and if the query result is that the node with the attribute to be deleted is queried, deleting the attribute to be deleted at the node with the attribute to be deleted.
In this embodiment, after deleting the attribute to be deleted at the node where the attribute to be deleted is set, the node where the attribute to be deleted is set may be further deleted. And if the query result is that the node with the attribute to be deleted is not queried, an error is inevitably generated at a certain position, and the system can report the error.
Optionally, when the management instruction is a modification instruction, the attribute to be managed is an attribute to be modified, and the method further includes: determining an attribute used for modifying the attribute to be modified from the modification instruction, wherein the attribute is called a substitute attribute; managing the attributes to be managed according to the query result comprises: and if the query result is that the node with the attribute to be modified is queried, modifying the attribute to be modified by using the alternative attribute at the node with the attribute to be modified.
In this embodiment, when the management instruction is a modification instruction, the management instruction necessarily indicates the attribute to be modified and a substitute attribute for modifying the attribute to be modified. If the management instruction is to modify the network behavior 1 of the dynamic attribute in the PDF file into the network behavior 2, the attribute to be modified is the network behavior 1, and the alternate attribute is the network behavior 2. Furthermore, when the query result is that the node with the attribute to be modified is queried, the attribute to be modified can be modified by using the alternative attribute. In addition, if the query result is that the node with the attribute to be modified is not queried, an error is inevitably generated at a certain position, and the system can report the error.
Optionally, the setting modification policy is as follows:
modifying the attribute to be modified by using the substitute attribute may include:
when the alternate attribute carries a preset identifier, modifying the attribute to be modified by using the alternate attribute;
when the alternate attribute does not carry the preset identifier and the attribute to be modified carries the preset identifier, forbidding to modify the attribute to be modified by using the alternate attribute;
and when the alternate attribute and the attribute to be modified do not carry the preset identifier, comparing the priorities of the alternate attribute and the attribute to be modified, wherein when the priority of the alternate attribute is greater than or equal to the priority of the attribute to be modified, the attribute to be modified is modified by using the alternate attribute, and when the priority of the alternate attribute is smaller than the priority of the attribute to be modified, the attribute to be modified is forbidden to be modified by using the alternate attribute.
In this embodiment, the predetermined identifier has a mandatory meaning, and when the alternate attribute carries the predetermined identifier, because the alternate attribute is used to modify the attribute to be modified, the alternate attribute carrying the predetermined identifier has a mandatory modification right, and at this time, it is not necessary to consider whether the attribute to be modified has the predetermined identifier, but the alternate attribute is directly used to modify the attribute to be modified. When the alternate attribute does not carry the predetermined identifier and the attribute to be modified carries the predetermined identifier, the attribute to be modified originally exists in the tree structure, and the alternate attribute does not have the mandatory right, and the attribute to be modified carrying the predetermined identifier has the mandatory place-occupying right, so that the system can prohibit a user from modifying the attribute to be modified by using the alternate attribute. When the alternate attribute and the attribute to be modified do not carry the preset identification, the mandatory significance is not required to be considered, only the priority of the alternate attribute and the priority of the attribute to be modified need to be compared, and in order to ensure that the system can be updated in time, the modification operation can be realized as long as the priority of the alternate attribute is not lower than the priority of the attribute to be modified.
Alternatively, the modification policy described above may be employed when the attribute to be modified and the alternate attribute belong to the broad class of security attributes. In this case, the priorities of the attributes are ranked from high to low as: attributes collected by the white list (the attributes collected by the white list belong to safe attributes), attributes belonging to safety are confirmed in a retrace or other mode, attributes which are not reported after scanning by antivirus software, unknown attributes, attributes with a false alarm rate larger than or equal to a preset threshold value, attributes with a false alarm rate smaller than the preset threshold value, and attributes belonging to viruses or trojans are reported by the antivirus software.
By the management method of the security entity provided by the invention, each attribute of the security entity is stored on one node, so that the storage structure of the security entity integrally forms a layered tree structure, the structure is clear, the management is convenient, and the child nodes can share the attribute definition of the father node, thereby reducing the repeated definition. When the attributes of the security entity are managed, a query path suitable for the tree structure is constructed, for example, the query path comprises a plurality of layers with progressive relations, then nodes of the tree structure are positioned layer by layer through the query path, and a query result is accurately and quickly obtained, for example, the query result is the node which is inquired to set the attribute to be managed, or the query result is the node which is not inquired to set the attribute to be managed, further, the attribute to be managed can be managed according to the query result.
The embodiment of the present invention further provides a management device for a security entity, where the management device for a security entity corresponds to the management method for a security entity provided in the above embodiment, and corresponding technical features and technical effects are not described in detail in this embodiment, and reference may be made to the above embodiment for relevant points. Specifically, the storage structure of the security entity is a tree structure, the tree structure includes a plurality of nodes, each node sets an attribute of the security entity, fig. 3 schematically illustrates a block diagram of a management apparatus of the security entity according to an embodiment of the present invention, and as shown in fig. 3, the management apparatus 300 of the security entity may include a determining module 301, a constructing module 302, a querying module 303, and a managing module 304, where:
a determining module 301, configured to determine, in response to a management instruction for the secure entity, an attribute to be managed of the secure entity from the management instruction;
a constructing module 302, configured to construct a query path for querying the attribute to be managed, where the query path includes a plurality of layers having a progressive relationship;
a query module 303, configured to query the tree structure by using the query path, and query a node in the tree structure for setting the attribute to be managed by using the query path;
and the management module 304 is configured to manage the attribute to be managed according to the query result.
The management method of the security entity stores each attribute of the security entity on one node, so that the storage structure of the security entity integrally forms a layered tree structure, the structure is clear, the management is convenient, and the child nodes can share the attribute definition of the father node, thereby reducing the repeated definition. When the attributes of the security entity are managed, a query path suitable for the tree structure is constructed, for example, the query path comprises a plurality of layers with progressive relations, then nodes of the tree structure are positioned layer by layer through the query path, and a query result is accurately and quickly obtained, for example, the query result is the node which is inquired to set the attribute to be managed, or the query result is the node which is not inquired to set the attribute to be managed, further, the attribute to be managed can be managed according to the query result.
Optionally, the secure entity has a unique identifier, and the secure entity associates the tree structure with the unique identifier, and the construction module is further configured to: obtaining the unique identifier; constructing the query path using the unique identifier.
Optionally, the construction module, when obtaining the unique identifier, is further configured to: judging whether the management instruction carries the unique identifier or not; if the management instruction carries the unique identifier, acquiring the unique identifier from the management instruction; and if the management instruction does not carry the unique identifier, acquiring the unique identifier from the index relationship of the secure entity, wherein the index relationship of the secure entity comprises the relationship between the secure entity and the unique identifier.
Optionally, when the management instruction is a new instruction, the attribute to be managed is an attribute to be added, and the management module is further configured to: if the query result is that the node with the attribute to be newly added is queried, error reporting processing is carried out; and if the query result indicates that the node with the attribute to be newly added is not queried, newly adding a node in the tree structure, and storing the attribute to be newly added at the newly added node.
Optionally, when the management instruction is a delete instruction, the attribute to be managed is an attribute to be deleted, and the management module is further configured to: and if the query result is that the node with the attribute to be deleted is queried, deleting the attribute to be deleted at the node with the attribute to be deleted.
Optionally, when the management instruction is a modification instruction, the attribute to be managed is an attribute to be modified, and the apparatus further includes: the processing module is used for determining an attribute used for modifying the attribute to be modified from the modification instruction, and the attribute is called a substitute attribute; the management module is further configured to: and if the query result is that the node with the attribute to be modified is queried, modifying the attribute to be modified by using the alternative attribute at the node with the attribute to be modified.
Optionally, when the attribute to be modified is modified by using the substitute attribute, the management module is further configured to: when the alternate attribute carries a preset identifier, modifying the attribute to be modified by using the alternate attribute; when the alternate attribute does not carry the preset identifier and the attribute to be modified carries the preset identifier, forbidding to modify the attribute to be modified by using the alternate attribute; and when the alternate attribute and the attribute to be modified do not carry the preset identifier, comparing the priorities of the alternate attribute and the attribute to be modified, wherein when the priority of the alternate attribute is greater than or equal to the priority of the attribute to be modified, the attribute to be modified is modified by using the alternate attribute, and when the priority of the alternate attribute is smaller than the priority of the attribute to be modified, the attribute to be modified is forbidden to be modified by using the alternate attribute.
Fig. 4 schematically shows a block diagram of a computer device adapted to implement a method of management of a security entity according to an embodiment of the present invention. In this embodiment, the computer device 400 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster composed of a plurality of servers), and the like that execute programs. As shown in fig. 4, the computer device 400 of the present embodiment includes at least, but is not limited to: a memory 401, a processor 402, a network interface 403 communicatively coupled to each other via a system bus. It is noted that FIG. 4 only shows the computer device 400 having components 401 and 403, but it is understood that not all of the shown components are required and that more or fewer components may be implemented instead.
In this embodiment, the memory 403 includes at least one type of computer-readable storage medium, which includes flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the storage 401 may be an internal storage unit of the computer device 400, such as a hard disk or a memory of the computer device 400. In other embodiments, the memory 401 may also be an external storage device of the computer device 400, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the computer device 400. Of course, the memory 401 may also include both internal and external storage devices for the computer device 400. In this embodiment, the memory 401 is generally used for storing an operating system installed in the computer device 400 and various kinds of application software, such as program codes of a management method of a secure entity, and the like. Further, the memory 401 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 402 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 402 is generally used to control the overall operation of the computer device 400. Such as program code for performing a method of managing secure entities for data interaction or communication related control and processing with computer device 400.
In this embodiment, the method for managing the security entity stored in the memory 401 may be further divided into one or more program modules and executed by one or more processors (in this embodiment, the processor 402) to complete the present invention.
The network interface 403 may comprise a wireless network interface or a wired network interface, the network interface 403 typically being used to establish communication links between the computer device 400 and other computer devices. For example, the network interface 403 is used to connect the computer apparatus 400 with an external terminal through a network, establish a data transmission channel and a communication link between the computer apparatus 400 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), or Wi-Fi.
The present embodiment also provides a computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor implements a management method of a secure entity.
It will be apparent to those skilled in the art that the modules or steps of the embodiments of the invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.