CN101729551B - 控制受信网络节点的访问权限的方法和系统 - Google Patents
控制受信网络节点的访问权限的方法和系统 Download PDFInfo
- Publication number
- CN101729551B CN101729551B CN200910220861XA CN200910220861A CN101729551B CN 101729551 B CN101729551 B CN 101729551B CN 200910220861X A CN200910220861X A CN 200910220861XA CN 200910220861 A CN200910220861 A CN 200910220861A CN 101729551 B CN101729551 B CN 101729551B
- Authority
- CN
- China
- Prior art keywords
- account
- user
- password
- null
- strong random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/941,559 | 2004-09-15 | ||
| US10/941,559 US8230485B2 (en) | 2004-09-15 | 2004-09-15 | Method and system for controlling access privileges for trusted network nodes |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2005100924354A Division CN1750537A (zh) | 2004-09-15 | 2005-08-15 | 控制受信网络节点的访问权限的方法和系统 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN101729551A CN101729551A (zh) | 2010-06-09 |
| CN101729551B true CN101729551B (zh) | 2013-07-31 |
Family
ID=35539702
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2005100924354A Pending CN1750537A (zh) | 2004-09-15 | 2005-08-15 | 控制受信网络节点的访问权限的方法和系统 |
| CN200910220861XA Expired - Fee Related CN101729551B (zh) | 2004-09-15 | 2005-08-15 | 控制受信网络节点的访问权限的方法和系统 |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2005100924354A Pending CN1750537A (zh) | 2004-09-15 | 2005-08-15 | 控制受信网络节点的访问权限的方法和系统 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US8230485B2 (enExample) |
| EP (1) | EP1638034A3 (enExample) |
| JP (1) | JP2006085697A (enExample) |
| KR (1) | KR20060048819A (enExample) |
| CN (2) | CN1750537A (enExample) |
Families Citing this family (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8219807B1 (en) | 2004-12-17 | 2012-07-10 | Novell, Inc. | Fine grained access control for linux services |
| US8271785B1 (en) | 2004-12-20 | 2012-09-18 | Novell, Inc. | Synthesized root privileges |
| US8214398B1 (en) | 2005-02-16 | 2012-07-03 | Emc Corporation | Role based access controls |
| US8074214B2 (en) | 2005-05-19 | 2011-12-06 | Oracle International Corporation | System for creating a customized software installation on demand |
| US8352935B2 (en) * | 2005-05-19 | 2013-01-08 | Novell, Inc. | System for creating a customized software distribution based on user requirements |
| US8676973B2 (en) * | 2006-03-07 | 2014-03-18 | Novell Intellectual Property Holdings, Inc. | Light-weight multi-user browser |
| US7886343B2 (en) * | 2006-04-07 | 2011-02-08 | Dell Products L.P. | Authentication service for facilitating access to services |
| US8700788B2 (en) | 2006-08-18 | 2014-04-15 | Smarticon Technologies, Llc | Method and system for automatic login initiated upon a single action with encryption |
| US7730480B2 (en) * | 2006-08-22 | 2010-06-01 | Novell, Inc. | System and method for creating a pattern installation by cloning software installed another computer |
| US20080104239A1 (en) * | 2006-10-27 | 2008-05-01 | Lipinski Greg J | Method and system of managing accounts by a network server |
| US8413222B1 (en) * | 2008-06-27 | 2013-04-02 | Symantec Corporation | Method and apparatus for synchronizing updates of authentication credentials |
| US20110041166A1 (en) * | 2009-08-17 | 2011-02-17 | Avaya Inc. | Method of Password Assignment |
| KR101876466B1 (ko) * | 2009-09-09 | 2018-07-10 | 삼성전자 주식회사 | 컴퓨터시스템 및 그 제어방법 |
| US9443078B2 (en) * | 2010-04-20 | 2016-09-13 | International Business Machines Corporation | Secure access to a virtual machine |
| CN102739404B (zh) * | 2012-06-29 | 2016-01-06 | 浪潮(北京)电子信息产业有限公司 | 一种密码管理方法和系统 |
| CN104969235B (zh) * | 2013-01-31 | 2018-02-02 | 日本电气株式会社 | 网络系统 |
| US20150333910A1 (en) * | 2014-05-17 | 2015-11-19 | Dylan Kirdahy | Systems, methods, and apparatuses for securely accessing user accounts |
| JP6025797B2 (ja) * | 2014-10-07 | 2016-11-16 | キヤノン株式会社 | 画像形成装置、該装置の制御方法、及びプログラム |
| CN108038367B (zh) * | 2017-12-07 | 2021-02-26 | 上海摩软通讯技术有限公司 | 用户设备的权限管理的控制方法及系统 |
| US11025425B2 (en) | 2018-06-25 | 2021-06-01 | Elasticsearch B.V. | User security token invalidation |
| US11223626B2 (en) | 2018-06-28 | 2022-01-11 | Elasticsearch B.V. | Service-to-service role mapping systems and methods |
| US11196554B2 (en) * | 2018-07-27 | 2021-12-07 | Elasticsearch B.V. | Default password removal |
| US11023598B2 (en) | 2018-12-06 | 2021-06-01 | Elasticsearch B.V. | Document-level attribute-based access control |
| US11552943B2 (en) * | 2020-11-13 | 2023-01-10 | Cyberark Software Ltd. | Native remote access to target resources using secretless connections |
| CN113362085A (zh) * | 2021-06-09 | 2021-09-07 | 广州智会云科技发展有限公司 | 一种子母账号管理方法及系统 |
| CN114422182B (zh) * | 2021-12-13 | 2024-01-16 | 以萨技术股份有限公司 | 一种统一身份管理平台 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6161139A (en) * | 1998-07-10 | 2000-12-12 | Encommerce, Inc. | Administrative roles that govern access to administrative functions |
| CN1365562A (zh) * | 1999-05-28 | 2002-08-21 | 艾利森电话股份有限公司 | 用于保密通信的方法和设备 |
| US7308580B2 (en) * | 2002-04-23 | 2007-12-11 | International Business Machines Corporation | System and method for ensuring security with multiple authentication schemes |
Family Cites Families (30)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS63286950A (ja) | 1987-05-19 | 1988-11-24 | Fujitsu Ltd | ログイン処理方式 |
| JPH0530103A (ja) | 1991-07-23 | 1993-02-05 | Fujitsu Ltd | リモートによるパスワード設定方式 |
| US6275941B1 (en) * | 1997-03-28 | 2001-08-14 | Hiatchi, Ltd. | Security management method for network system |
| US5944824A (en) | 1997-04-30 | 1999-08-31 | Mci Communications Corporation | System and method for single sign-on to a plurality of network elements |
| US6000033A (en) * | 1997-11-26 | 1999-12-07 | International Business Machines Corporation | Password control via the web |
| JPH11265544A (ja) * | 1998-03-16 | 1999-09-28 | Fujitsu Ltd | 記憶装置及びそのパスワード制御方法 |
| JP2000172500A (ja) | 1998-12-07 | 2000-06-23 | Fujitsu Ltd | ソフトウエア利用管理システム及びそのシステムでの処理をコンピュータに行わせるためのプログラムを格納する記憶媒体 |
| US6647497B1 (en) * | 1999-03-31 | 2003-11-11 | International Business Machines Corporation | Method and system for secure computer system transfer |
| US6851060B1 (en) * | 1999-07-15 | 2005-02-01 | International Business Machines Corporation | User control of web browser user data |
| JP2001188755A (ja) | 1999-12-28 | 2001-07-10 | Casio Comput Co Ltd | 通信電子機器及び通信処理プログラムを記憶した記憶媒体 |
| US6993658B1 (en) * | 2000-03-06 | 2006-01-31 | April System Design Ab | Use of personal communication devices for user authentication |
| US7150038B1 (en) * | 2000-04-06 | 2006-12-12 | Oracle International Corp. | Facilitating single sign-on by using authenticated code to access a password store |
| AU8097501A (en) * | 2000-08-04 | 2002-02-18 | Computer Ass Think Inc | Systems and methods for authenticating a user to a web server |
| US6807577B1 (en) * | 2000-09-14 | 2004-10-19 | International Business Machines Corporation | System and method for network log-on by associating legacy profiles with user certificates |
| US7260838B2 (en) * | 2000-12-18 | 2007-08-21 | International Business Machines Corporation | Incorporating password change policy into a single sign-on environment |
| US7197765B2 (en) * | 2000-12-29 | 2007-03-27 | Intel Corporation | Method for securely using a single password for multiple purposes |
| US7043489B1 (en) * | 2001-02-23 | 2006-05-09 | Kelley Hubert C | Litigation-related document repository |
| DE10139888A1 (de) | 2001-08-20 | 2003-03-20 | Bayerische Motoren Werke Ag | Verfahren zum automatischen Login einer insbesondere in einem Kraftfahrzeug befindlichen Teilnehmerstation in einem externen Informationssystem |
| JP2003162509A (ja) | 2001-11-27 | 2003-06-06 | Nec Soft Ltd | ユーザ情報の一括管理システム及びその方法 |
| US20040054592A1 (en) * | 2002-09-13 | 2004-03-18 | Konrad Hernblad | Customer-based wireless ordering and payment system for food service establishments using terminals and mobile devices |
| US20040059924A1 (en) * | 2002-07-03 | 2004-03-25 | Aurora Wireless Technologies, Ltd. | Biometric private key infrastructure |
| US20040034583A1 (en) * | 2002-08-15 | 2004-02-19 | Lanier Cheryl Lynn | Systems and methods for performing electronic check commerce |
| EP1554659A4 (en) | 2002-10-25 | 2009-07-22 | Bettina Experton | SYSTEM AND METHOD FOR AUTOMATICALLY LAUNCHING AND ACCESSING NETWORK ADDRESSES AND APPLICATIONS |
| US7690025B2 (en) * | 2003-04-03 | 2010-03-30 | General Electric Company | Methods and systems for accessing a network-based computer system |
| US7640324B2 (en) * | 2003-04-15 | 2009-12-29 | Microsoft Corporation | Small-scale secured computer network group without centralized management |
| US7620679B2 (en) | 2003-10-23 | 2009-11-17 | Microsoft Corporation | System and method for generating aggregated data views in a computer network |
| US20050170321A1 (en) * | 2004-01-30 | 2005-08-04 | Scully Helen M. | Method and system for career assessment |
| US20050182654A1 (en) * | 2004-02-14 | 2005-08-18 | Align Technology, Inc. | Systems and methods for providing treatment planning |
| US7506170B2 (en) * | 2004-05-28 | 2009-03-17 | Microsoft Corporation | Method for secure access to multiple secure networks |
| US20060059346A1 (en) * | 2004-09-14 | 2006-03-16 | Andrew Sherman | Authentication with expiring binding digital certificates |
-
2004
- 2004-09-15 US US10/941,559 patent/US8230485B2/en not_active Expired - Fee Related
-
2005
- 2005-07-15 EP EP05015437A patent/EP1638034A3/en not_active Withdrawn
- 2005-07-27 KR KR1020050068468A patent/KR20060048819A/ko not_active Withdrawn
- 2005-08-15 CN CNA2005100924354A patent/CN1750537A/zh active Pending
- 2005-08-15 CN CN200910220861XA patent/CN101729551B/zh not_active Expired - Fee Related
- 2005-09-07 JP JP2005259125A patent/JP2006085697A/ja active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6161139A (en) * | 1998-07-10 | 2000-12-12 | Encommerce, Inc. | Administrative roles that govern access to administrative functions |
| CN1365562A (zh) * | 1999-05-28 | 2002-08-21 | 艾利森电话股份有限公司 | 用于保密通信的方法和设备 |
| US7308580B2 (en) * | 2002-04-23 | 2007-12-11 | International Business Machines Corporation | System and method for ensuring security with multiple authentication schemes |
Also Published As
| Publication number | Publication date |
|---|---|
| US20060059359A1 (en) | 2006-03-16 |
| JP2006085697A (ja) | 2006-03-30 |
| US8230485B2 (en) | 2012-07-24 |
| CN1750537A (zh) | 2006-03-22 |
| EP1638034A2 (en) | 2006-03-22 |
| EP1638034A3 (en) | 2013-01-16 |
| KR20060048819A (ko) | 2006-05-18 |
| CN101729551A (zh) | 2010-06-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101729551B (zh) | 控制受信网络节点的访问权限的方法和系统 | |
| US20240013210A1 (en) | Data Processing System Utilising Distributed Ledger Technology | |
| US12047365B2 (en) | System and method for pool-based identity authentication for service access without use of stored credentials | |
| US6807577B1 (en) | System and method for network log-on by associating legacy profiles with user certificates | |
| KR100920871B1 (ko) | 네트워크 위치의 하위 위치에 대한 사용자의 인증을 위한방법 및 시스템 | |
| US7356704B2 (en) | Aggregated authenticated identity apparatus for and method therefor | |
| US8205098B2 (en) | Secure and usable protection of a roamable credentials store | |
| US9172541B2 (en) | System and method for pool-based identity generation and use for service access | |
| JP2011044178A (ja) | バイオメトリックデバイスを用いて企業リソースへのアクセスを可能にするシステム、方法およびコンピュータプログラム製品 | |
| WO2007039865A2 (en) | System and/or method for authentication and/or authorization | |
| US8301900B1 (en) | Secure transformable password generation | |
| Ashley et al. | Applying authorization to intranets: architectures, issues and APIs | |
| Dinesha et al. | Evaluation of secure cloud transmission protocol | |
| JP2009521030A (ja) | 分散及び集中システムにおいて役割を定義する際のコンポーネント・ターゲットの使用 | |
| Vullings et al. | Secure federated authentication and authorisation to grid portal applications using saml and xacml | |
| Omorogiuwa et al. | DESIGN AND IMPLEMENTATION OF A NOMADIC MOBILE APP TO AID MULTI-LEVEL AUTHENTICATION IN A UBIQUITOUS WORK ENVIRONMENT | |
| KR101066729B1 (ko) | 네트워크 위치의 하위 위치에 대한 사용자의 인증을 위한 방법 및 시스템 | |
| Khan | Review of Attribute-based Keyword Search Authorization in Cloud | |
| Ali et al. | ACQUIRING THE CLOUDS USING OTP |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130731 Termination date: 20140815 |
|
| EXPY | Termination of patent right or utility model |