CN106712948B - Distributed control architecture for software security and control method thereof - Google Patents

Distributed control architecture for software security and control method thereof Download PDF

Info

Publication number
CN106712948B
CN106712948B CN201710136972.7A CN201710136972A CN106712948B CN 106712948 B CN106712948 B CN 106712948B CN 201710136972 A CN201710136972 A CN 201710136972A CN 106712948 B CN106712948 B CN 106712948B
Authority
CN
China
Prior art keywords
user
unit
software
server management
management unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710136972.7A
Other languages
Chinese (zh)
Other versions
CN106712948A (en
Inventor
张昱
关胜
张陶
杨帆
杨瑞宇
武长海
齐亚娜
闫俊俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway Design Corp
Original Assignee
China Railway Design Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway Design Corp filed Critical China Railway Design Corp
Priority to CN201710136972.7A priority Critical patent/CN106712948B/en
Publication of CN106712948A publication Critical patent/CN106712948A/en
Application granted granted Critical
Publication of CN106712948B publication Critical patent/CN106712948B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The invention provides a software security distributed control architecture, which comprises a server management unit, a plurality of user using units and a plurality of encryption operation units, wherein the server management unit comprises a host computer and a standby computer, the standby computer is in a hot standby mode, and the host computer and the standby computer of the server management unit are connected through an Ethernet; each user using unit is connected with the server management unit through the Ethernet; each encryption operation unit corresponds to each user using unit one by one, and the encryption operation units and the user using units are connected through a serial bus USB. Meanwhile, a control method of the distributed control architecture utilizing software security is provided. The invention has the effect of realizing dynamic cooperative control of software security, so that the whole software security control architecture has higher security, compatibility, stability, reliability and usability. The software can be used for a limited number of times by a user in an environment without network connection, and the user experience of the user is improved.

Description

Distributed control architecture for software security and control method thereof
Technical Field
The invention relates to the field of software security, in particular to a distributed control architecture and a control method thereof.
Background
The existing software security control architecture adopts the following two modes: firstly, a server-client mechanism is adopted, a user client reads self information (such as self hardware information and the like), self identification is generated according to a certain rule and then sent to a server, after the server verifies the identification, the identification is interacted with the client verification information, after the client receives the verification information, software registration is completed, and meanwhile, the server manages user registration information (such as effective period and the like). And secondly, a certain software encryption algorithm is adopted, the server and the client side calculate according to the respective algorithms, then the operation results are compared, if the comparison results are consistent, software registration is completed, and meanwhile, the server manages the user registration information (such as effective period and the like).
The existing software security control architecture adopts an information verification mode and a rule which are fixed in a period of time, so that the risk of being cracked exists, and for the first mode, after the coding rule of verification information between a server and a client is cracked, the software security control is invalid; for the second mode, when the encryption algorithm between the server and the client is cracked, the software security control fails; in either way, when the network between the server and the client fails, the client cannot use the software, which causes inconvenience to users in using the software for a limited time in some environments without network, and reduces the availability and user experience of the software control architecture.
Disclosure of Invention
Aiming at the defects of the prior art in the architecture, the invention aims to provide a distributed control frame architecture for software security and a control method thereof, which dynamically control the software security, wherein the software legitimacy operation is completed locally by a specific user unit, the legitimacy operation of the user unit using the software is controlled by a server management unit in real time, the legitimacy operation of the user when using the software each time is based on the security algorithm interacted by the server management unit, the security algorithm can be updated in real time according to the requirement, and meanwhile, the server management unit pre-authorizes the encryption rule and the use enable of the user unit when using the software next time, so that the user unit can legally use the software for a limited time when a network fails.
In order to achieve the above purpose, the technical scheme adopted by the invention is to provide a software secure distributed control architecture, wherein: the control architecture comprises a server management unit, a plurality of user using units and a plurality of encryption operation units, wherein the server management unit comprises a host and a hot standby machine, when the host fails, the standby machine takes over the host to complete the functions of the host, and when the host fails and recovers, the host is switched to the hot standby mode, and the host and the standby machine of the server management unit are connected through Ethernet; each user using unit is connected with the server management unit through the Ethernet; each encryption operation unit corresponds to each user using unit one by one, and the encryption operation units and the user using units are connected through a serial bus USB.
A control method of the distributed control architecture using the software security of claim 1 is also provided.
The invention has the effects that the software safety distributed control architecture and the control method are used:
first, the security is high. Compared with the safety of the existing software safety control architecture, the structure of the software safety distributed control architecture can improve the safety of software control in an exponential manner, and the exponent value is larger than the quantity value of the encryption algorithm adopted in the control architecture, namely, if the safety of a certain encryption rule is defined as a reference value, the safety of the existing software safety control architecture is based on a certain encryption rule in a certain period, and then the safety of the existing software safety control architecture is the reference value; in the control architecture of the present invention, firstly, each user using unit and the corresponding encryption operation unit need to be interacted based on a certain encryption rule, at this time, the security of the control architecture of the present invention has a reference value, secondly, the server management unit judges whether the user using unit is an effective registered user or not, and also needs to be based on a certain encryption rule, at this time, the security of the control architecture of the present invention is based on the reference value, and then a reference value is superimposed, which is the power of 2 of the reference value, finally, the server management unit and each user unit need to interact with an encryption algorithm, and for simplicity, the security of each algorithm is still defined as the reference value, and if N encryption algorithms are available for random alternation interaction between the server management unit and the user unit, the security of the encryption algorithm interaction between the server management unit and the user unit is the power of N of the reference value, at this time, the security of the control architecture of the present invention is based on the power of 2 of the reference value, and is the power of n+2 of the reference value, thus the security of the present invention is visible, and the security of the control architecture of the present invention is greatly improved.
Second, the compatibility is strong. All encryption algorithms can be applied to the software security distributed control architecture of the invention.
Thirdly, the stability is strong and the reliability is high. In the framework of the invention, the server management unit adopts a double-machine hot standby mode, and when the host machine fails, the host machine can be seamlessly replaced by the standby machine to complete the functions of the server management unit, so that the stability and the reliability of the whole framework of the invention can be ensured.
Fourth, the usability is strong. In the software security distributed control architecture, the encryption algorithm between the server management unit and the user using unit and the interaction using enable have a pre-authorization mechanism, so that the user can use the software for a limited time in an environment without network connection, and the user experience of the user is improved.
Drawings
FIG. 1 is a diagram of a software secure distributed control architecture of the present invention;
FIG. 2 is a flow chart of a software secured distributed control architecture of the present invention.
In the figure:
1. server management unit 2, user use unit 3, and encryption operation unit
4. Ethernet 5, serial bus USB 6, host of server management unit
7. Standby machine of server management unit
Detailed Description
The software security distributed control architecture and the control method thereof are described with reference to the accompanying drawings.
The invention relates to a software safe distributed control architecture and a control method thereof, wherein the design idea is as follows:
firstly, realizing the centralized management function of the whole control architecture through the server management unit 1 of the control architecture, forming a dual hot standby structure by a host 6 and a standby 7, specifically completing the management of the user using units 2, including verifying the legitimacy of all the user using units 2, interacting the encryption algorithm and the use enabling of each piece of software used by each legal user using unit 2, and pre-authorizing the encryption algorithm and the use enabling of the next piece of software used by the user using unit 2;
secondly, the user using unit 2 of the control architecture completes the validity verification of the specific user using software, including verifying whether the encryption operation unit 3 connected with the user using unit 2 is matched with the user using unit 2, initiating the registration connection with the server management unit 1, receiving the connection result, judging whether the connection is effective, receiving and storing the encryption algorithm and the use enabling of the software used by the user and issued by the server management unit 1 at the time and the next time under the condition of effective connection, determining whether the software validity operation is the encryption algorithm and the use enabling interacted by the server management unit 1 or the pre-authorization encryption algorithm and the use enabling stored when the software used by the user using unit 2 last time, issuing the encryption algorithm to the encryption operation unit 3 uniquely corresponding to the user and receiving the operation result, comparing the operation result with the use enabling issued by the server management unit 1, and verifying the validity of the user using software;
thirdly, the encryption operation unit 3 of the control architecture completes the operation of a specific encryption algorithm, which comprises receiving the encryption algorithm issued by the user using unit 2, performing operation according to the encryption algorithm, interacting the operation result to the user using unit 2 uniquely corresponding to the user using unit, and in addition, when the user using unit 2 judges whether the encryption operation unit 3 is matched with the user using unit 2, interacting the stored identification information to the user using unit 2 for judging whether the user using unit 2 is matched.
According to the invention, the user using unit 2 needs to interact with a security mechanism based on the server management unit 1 each time of software validity operation, including security algorithm and use enabling, based on the security mechanism, dynamic update of the software encryption algorithm can be realized, and through pre-authorization of the user using unit 2, the next time of software validity operation can be interacted with next time of encryption algorithm and use enabling, based on the security mechanism, the user can legally use the software for a limited time when the network fails.
The software secure distributed control architecture can realize each time of software use of each user according to the needs, the encryption algorithm used by the software secure distributed control architecture is different from that of other users, and all encryption algorithms can be applied to the control architecture at present.
As shown in fig. 1, the structure of the software secure distributed control architecture of the present invention is: the server management unit 1 consists of a host 6 and a standby machine 7, wherein the host 6 and the standby machine 7 are mutually independent, a non-X86 server or an X86 server can be selected according to different practical application scenes, the host 6 and the standby machine 7 respectively have independent processors, a storage system, a system bus, input and output equipment, system software and server-side control software of the control architecture, the host 6 and the standby machine 7 are connected through the Ethernet 4, the standby machine 7 synchronizes data of the whole control architecture with the host 6 in real time, firstly, the registration information of all legal user using units 2 is synchronized, and the method comprises the steps of storing unique identity identifiers of all legal users 2, valid registration periods of all legal registered users 2, newly added legal user operations 2 and deleting legal user 2 operations exceeding the valid registration periods; secondly, the working state of the host computer 6 is monitored in real time, when the host computer 6 fails, the standby computer 7 and the host computer 6 are switched, the standby computer 7 takes over the host computer 6 to complete the functions of the host computer 6, alarm information is given at the same time, and when the host computer 6 fails and is recovered, the host computer 6 and the standby computer 7 are switched, and the standby computer 7 is recovered to a hot standby mode; third, the network connection status information of the real-time synchronous host 6 and all legal user using units 2 comprises network link status information and communication connection information of any user using unit 2.
The user using unit 2 is application software on a user computer platform, and interacts control information with the server management unit 1 and the encryption operation unit 3 to complete validity verification of the user using software, the user computer platform where the user using unit 2 is located is connected with the server management unit 1 through the Ethernet 4 by using an Ethernet interface of the user using unit 2, and information communication can be realized through the Ethernet 4 with both the host 6 and the standby 7 in the server management unit 1; the user computer platform where the user using unit 2 is located is connected with the encryption operation unit 3 through a serial bus USB5 by using a USB interface thereof, and the user using unit 2 internally stores identification information of the encryption operation unit 3 unique to the user using unit.
The encryption operation unit 3 is a microprocessor, such as an 8051 series single-chip microcomputer, an ARM series microprocessor and the like, a memory ROM, a RAM, a peripheral circuit such as a clock circuit, a USB interface circuit and a memory management circuit, and the microprocessor capacity and the memory capacity can be configured according to actual application conditions; the encryption operation unit 3 is connected to the user use unit 2 via a serial bus USB5 by using its USB interface.
In the structure of the software secure distributed control architecture of the present invention, the standby machine 7 in the server management unit 1 adopts a hot standby mode, and when the host machine 6 fails, the host machine 6 is seamlessly replaced to complete the function thereof, and when the host machine 6 fails, the standby machine 7 is restored to the hot standby mode.
As shown in fig. 2, the control method of the distributed control architecture utilizing software security of the present invention includes the following steps:
step one, the server management unit 1 completes the centralized management of the whole control architecture in real time: firstly, storing and managing the registration information of all legal user using units 2 in real time, wherein the registration information comprises the steps of storing unique identity marks of each legal user 2, valid registration period of each legal registered user 2, newly adding a new legal user 2 and deleting the legal user 2 exceeding the valid registration period; secondly, the working states of the host 6 and the standby 7 in the composition are monitored in real time, when the host 6 fails, the standby 7 and the host 6 are switched, the standby 7 takes over the host 6 to complete the functions, alarm information is given at the same time, and when the host 6 fails and is recovered, the host 6 and the standby 7 are switched, and the standby 7 is recovered to a hot standby mode; and thirdly, monitoring network connection with all legal user using units 2 in real time, including monitoring whether network links are smooth, giving alarm information when network links fail, and managing communication connection with any user using unit 2 in real time.
Step two, when any specific user uses the software, the user using unit 2 of the user is firstly connected with the encryption operation unit 3 which is uniquely corresponding to the user using unit through the serial bus USB5, the identification information in the encryption operation unit 3 is read, whether the identification information is matched with the identification information stored in the user using unit 2 or not is judged, and if the identification information is matched with the identification information, the step three is entered; otherwise, the user is not allowed to use the software.
Step three, the user using unit 2 initiates communication connection to the server management unit 1 through the Ethernet 4, after receiving the connection request, the server management unit 1 judges whether the user using unit 2 is an effective registered user, if so, dynamically generates an encryption algorithm and use enabling of the software used by the user using unit 2 this time and the software used by the user using unit 2 next time in advance, and sends the encryption algorithm and use enabling to the user using unit 2 to enter step four; if the user is not effectively registered, the wrong connection information is issued to the user using unit 2, and the step four is entered.
Step four, the user using unit 2 waits for receiving the connection information returned by the server management unit 1, and if waiting for overtime, the step five is entered; if the connection information returned by the server management unit 1 is received, judging whether the connection information is error connection information, if yes, not allowing the user to use the software, if not, receiving the encryption algorithm and the use enable of the software used this time and the next time issued by the server management unit 1, covering the encryption algorithm and the use enable of the software used this time and issued by the server management unit 1, which are received when the user use unit 2 uses the software last time legally, storing the pre-authorization encryption algorithm and the use enable of the software used this time and issued by the server management unit 1 this time, finally issuing the encryption algorithm of the software used this time and issued by the server management unit 1 to the encryption operation unit 3 connected with the same through the serial bus USB5, and entering the step six.
Step five, the user using unit 2 waits for receiving the connection information timeout of the server management unit 1, judges whether the user himself stores the pre-authorized encryption algorithm of the use software and the use enable, if so, takes the pre-authorized encryption algorithm as the encryption algorithm of the use software, and issues the pre-authorized encryption algorithm to the encryption operation unit 3 connected with the pre-authorized encryption algorithm through the serial bus USB5 to enter step six; if not, the user is not allowed to use the software.
Step six, the encryption operation unit 3 performs local operation according to the encryption algorithm issued by the user using unit 2 and received through the serial bus USB5, returns the operation result to the user using unit 2 through the serial bus USB5, and enters step seven.
Step seven, the user using unit 2 compares the operation result returned by the encryption operation unit 3 with the use enabling of the software used at this time issued by the server management unit 1, if the operation result is consistent with the use enabling of the software used at this time, the user is allowed to use the software at this time, and the encryption algorithm and the use enabling of the software used at this time which are currently used by the user using unit 2 are deleted; if not, deleting the encryption algorithm and the use enable of the software used by the user using unit 2 at the time, and not allowing the user to use the software.

Claims (1)

1. The control method of the software safe distributed control architecture comprises a server management unit (1), a plurality of user using units (2) and a plurality of encryption operation units (3), and the control method comprises the following steps:
step one, when any specific user uses software, the user using unit (2) of the user is firstly connected with the encryption operation unit (3) which is uniquely corresponding to the user using unit through the serial bus USB (5), the identification information in the encryption operation unit (3) is read, whether the identification information is matched with the identification information stored in the user using unit (2) or not is judged, and if the identification information is matched with the identification information, the step two is entered; otherwise, the user is not allowed to use the software;
step two, the user using unit (2) initiates communication connection to the server management unit (1) through the Ethernet (4), after receiving a connection request, the server management unit (1) judges whether the user using unit (2) is an effective registered user, if so, the user using unit (2) dynamically generates an encryption algorithm and a use enabling of the software used at this time and the software used at the next time in advance, and sends the encryption algorithm and the use enabling to the user using unit (2) to enter the step three; if the user is not effectively registered, transmitting error connection information to the user using unit (2), and entering a step three;
step three, the user using unit (2) waits for receiving the connection information returned by the server management unit (1), and if waiting for overtime, the step four is entered; if the connection information returned by the server management unit (1) is received, judging whether the connection information is error connection information, if yes, not allowing the user to use the software, if not, receiving the encryption algorithm and the use enable of the software used this time and issued by the server management unit (1), covering the encryption algorithm and the use enable of the software used this time and issued by the server management unit (1), which are received when the user use unit (2) uses the software legally last time, storing the pre-authorization encryption algorithm and the use enable of the software used this time and issued by the server management unit (1), and finally issuing the encryption algorithm of the software used this time and issued by the server management unit (1) to the encryption operation unit (3) connected with the server management unit through the serial bus USB (5), and entering the fifth step;
step four, the user using unit (2) waits for receiving the overtime of the connection information of the server management unit (1), judges whether the user himself stores a pre-authorized encryption algorithm using software and use enabling, if so, takes the pre-authorized encryption algorithm as the encryption algorithm using the software at this time, and issues the pre-authorized encryption algorithm to the encryption operation unit (3) connected with the pre-authorized encryption algorithm through the serial bus USB (5) to enter the step five; if not, the user is not allowed to use the software;
step five, the user encryption operation unit (3) performs local operation according to the encryption algorithm issued by the user using unit (2) and received through the serial bus USB (5), returns an operation result to the user using unit (2) through the serial bus USB (5), and enters step six;
step six, the user using unit (2) compares the operation result returned by the encryption operation unit (3) with the use enabling of the software used at this time issued by the server management unit (1), if the operation result is consistent with the use enabling of the software used at this time, the user is allowed to use the software at this time, and the encryption algorithm and the use enabling of the software used at this time which are currently used by the user using unit (2) are deleted; if the user using unit (2) is inconsistent, deleting the encryption algorithm and the use enabling of the software used by the user, and not allowing the user to use the software.
CN201710136972.7A 2017-03-09 2017-03-09 Distributed control architecture for software security and control method thereof Active CN106712948B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710136972.7A CN106712948B (en) 2017-03-09 2017-03-09 Distributed control architecture for software security and control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710136972.7A CN106712948B (en) 2017-03-09 2017-03-09 Distributed control architecture for software security and control method thereof

Publications (2)

Publication Number Publication Date
CN106712948A CN106712948A (en) 2017-05-24
CN106712948B true CN106712948B (en) 2023-05-30

Family

ID=58918080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710136972.7A Active CN106712948B (en) 2017-03-09 2017-03-09 Distributed control architecture for software security and control method thereof

Country Status (1)

Country Link
CN (1) CN106712948B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201166864Y (en) * 2008-01-28 2008-12-17 李东声 Equipment for monitoring electronic transaction
CN101335615A (en) * 2008-05-30 2008-12-31 北京飞天诚信科技有限公司 Method used in key consultation of USB KEY audio ciphering and deciphering device
JP2011076546A (en) * 2009-10-01 2011-04-14 Yamaha Corp Data writer and installation device
CN103457739A (en) * 2013-09-06 2013-12-18 北京握奇智能科技有限公司 Method and device for acquiring dynamic token parameters
WO2014183704A1 (en) * 2013-11-28 2014-11-20 中兴通讯股份有限公司 Software registration control method, authentication server and terminal
CN104683354A (en) * 2015-03-24 2015-06-03 武汉理工大学 Dynamic password system based on label

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1819512A (en) * 2006-03-17 2006-08-16 北京飞天诚信科技有限公司 Information safety protecting method and protector based on network software
CN101174295B (en) * 2008-01-16 2010-09-01 北京飞天诚信科技有限公司 Off-line DRM authentication method and system
CN101686126A (en) * 2008-09-24 2010-03-31 北京创原天地科技有限公司 Method for certification of set of novel dynamic passwords and autonymous network accessing
US8423779B2 (en) * 2009-02-23 2013-04-16 Wms Gaming, Inc. Compounding security with a security dongle
CN104361267B (en) * 2014-11-19 2017-11-07 厦门海迈科技股份有限公司 Software authorizing and protecting device and method based on rivest, shamir, adelman

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201166864Y (en) * 2008-01-28 2008-12-17 李东声 Equipment for monitoring electronic transaction
CN101335615A (en) * 2008-05-30 2008-12-31 北京飞天诚信科技有限公司 Method used in key consultation of USB KEY audio ciphering and deciphering device
JP2011076546A (en) * 2009-10-01 2011-04-14 Yamaha Corp Data writer and installation device
CN103457739A (en) * 2013-09-06 2013-12-18 北京握奇智能科技有限公司 Method and device for acquiring dynamic token parameters
WO2014183704A1 (en) * 2013-11-28 2014-11-20 中兴通讯股份有限公司 Software registration control method, authentication server and terminal
CN104683354A (en) * 2015-03-24 2015-06-03 武汉理工大学 Dynamic password system based on label

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王权 ; 杨林 ; 刘伟 ; 王桢珍 ; .基于USBKEY的访问控制方法研究.计算机工程与设计.2008,(第11期),全文. *

Also Published As

Publication number Publication date
CN106712948A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
JP7042842B2 (en) How to generate offline verification code based on smart door lock system and its system
CN108881232B (en) Sign-on access method, apparatus, storage medium and the processor of operation system
CN103597800B (en) Automatically cloud service reconnects
KR20210061469A (en) Information interaction method, device and system
CN104168333A (en) Working method of PROXZONE service platform
CN104272699A (en) Certificate based connection to cloud virtual machine
CN113489691B (en) Network access method, network access device, computer readable medium and electronic equipment
CN105378671A (en) Providing domain-joined remote applications in a cloud environment
CN105306557A (en) Bridge health monitoring system based on cloud platform
CN107547595A (en) cloud resource scheduling system, method and device
CN104468217B (en) A kind of network reconnection method under 1394 network manager failure
CN110046166B (en) Timing task scheduling method and device based on block chain
CN108874573A (en) For using another equipment to repair the technology of inoperable ancillary equipment
KR101453671B1 (en) Integrated interface system for monitoring and controling electric power system
CN104639546A (en) Multi-biometric feature comprehensive authentication method, device and system
CN106712948B (en) Distributed control architecture for software security and control method thereof
CN106375334A (en) Authentication method for distributed system
CN108112268A (en) Management and the relevant load balancer of automatic expanded set
CN105763532B (en) A kind of method and device logging in virtual desktop
CN105471986B (en) A kind of Constructing data center Scale Revenue Ratio method and device
CN108833328B (en) Cloud management method and device, storage medium and processor
CN104753755A (en) System access method, system access device, application client, and IM background system
CN113497806B (en) Remote login method, device and storage medium
CN108713199A (en) Right management method, system, mobile terminal, shared charging equipment and server
CN111767500A (en) Data storage sharing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 300450 No. 109, East 7th Road, pilot free trade zone (Airport Economic Zone), Binhai New Area, Tianjin

Applicant after: CHINA RAILWAY DESIGN Corp.

Address before: 300010 Tianjin Hebei District Hebei District Zhongshan Road 10

Applicant before: THE THIRD RAILWAY SURVEY AND DESIGN INSTITUTE Group Corp.

GR01 Patent grant
GR01 Patent grant