CN102571703A - Security control system and security control method for cloud data - Google Patents

Security control system and security control method for cloud data Download PDF

Info

Publication number
CN102571703A
CN102571703A CN2010106021910A CN201010602191A CN102571703A CN 102571703 A CN102571703 A CN 102571703A CN 2010106021910 A CN2010106021910 A CN 2010106021910A CN 201010602191 A CN201010602191 A CN 201010602191A CN 102571703 A CN102571703 A CN 102571703A
Authority
CN
China
Prior art keywords
privately owned
ustomer premises
access equipment
cloud data
premises access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010106021910A
Other languages
Chinese (zh)
Inventor
李后贤
李章荣
罗治平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CN2010106021910A priority Critical patent/CN102571703A/en
Publication of CN102571703A publication Critical patent/CN102571703A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a security control system for cloud data. The security control system is applied to a private cloud server. Enterprise internal customer premises equipment accesses the private cloud server through an internal network; the private cloud server is used for storing private cloud data; and each internal customer premises equipment is provided with a global positioning system. The security control system can be used for carrying out multiple validation on the client by combining with current longitude and latitude attribute coordinate information and other permission control. If anyone validation of the customer premises equipment is failed, the security control system for the cloud data refuses an access request of the client equipment. If the current longitude and latitude attribute coordinate information and the other permission control information of the customer premises equipment respectively pass the validation, the security control system for the cloud data allows the customer premises equipment to access the private cloud data. The invention also provides a security control method for the cloud data.

Description

Cloud data security managing and control system and method
Technical field
The present invention relates to a kind of data security managing and control system and method, especially about a kind of cloud data security managing and control system and method.
Background technology
Cloud computing (cloud computing) is a kind of compute mode based on the Internet, and in this way, software and hardware resources and data can be shared between the network equipment.So-called cloud computing environment is exactly a kind of metaphor saying of network environment in fact.In cloud computing environment, in server, the user can see through browser or information is obtained in other network services with software and hardware resources and data storing for the operator.According to the setting of rights of using, cloud computing environment can be divided into two kinds in publicly-owned cloud and privately owned cloud.Publicly-owned cloud is meant through network provides the exterior of enterprise client extendible and flexible service, and this type of service maybe be for free or with low cost.Privately owned cloud is the service object with the enterprises client then, is applied to enterprises mostly, and after generally being structured in the fire compartment wall of enterprise.
The information that privately owned cloud stores relates to enterprise's secret mostly, for example enterprises organizational affiliation, sales data, financial statement and customer data etc.Therefore, the security management and control to privately owned cloud seems very important.At present, the information that is structured in the privately owned cloud behind the fire compartment wall of enterprise and generally privately owned cloud the is provided authority managing and controlling that conducts interviews with IP address or user account number and password.Its weak point is that the invador possibly break through the security perimeter of fire compartment wall through IP address, account and the password of camouflage validated user.
Summary of the invention
In view of above content, be necessary to provide a kind of cloud data security managing and control system and method, can strengthen the security management and control of privately owned cloud, more effectively take precautions against invador's attack.
A kind of cloud data security managing and control system; Be applied to privately owned Cloud Server; The enterprises ustomer premises access equipment is through this privately owned Cloud Server of internal network visit, and this privately owned Cloud Server stores privately owned cloud data, and each enterprises ustomer premises access equipment is equipped with global positioning system.This cloud data security managing and control system comprises: module, memory module, receiver module and authentication module are set.Module is set is used to be provided with the latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment of access rights.Memory module is used for the latitude and longitude coordinates range storage that is provided with to privately owned Cloud Server.Receiver module is used to receive the request that a ustomer premises access equipment is visited privately owned cloud data.Authentication module is used to check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server is distributed to internal user end equipment.If there is any authorization information illegal, then this ustomer premises access equipment of authentication module refusal is visited privately owned cloud data; If all authorization informations are all legal, then authentication module judges that this ustomer premises access equipment is the enterprises ustomer premises access equipment, allows this ustomer premises access equipment to visit privately owned cloud data.
A kind of cloud data security management-control method is applied to privately owned Cloud Server, and the enterprises user side is through this privately owned Cloud Server of internal network visit, and this privately owned Cloud Server stores privately owned cloud data, and each enterprises ustomer premises access equipment is equipped with global positioning system.This method comprises: the latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment of access rights (A) is set; (B) with the latitude and longitude coordinates range storage that is provided with to privately owned Cloud Server; (C) receive the request that a ustomer premises access equipment is visited privately owned cloud data; (D) check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server is distributed to internal user end subscriber end; And (E) if there is any authorization information illegal, then refuses this ustomer premises access equipment and visit privately owned cloud data, if all authorization informations are all legal, judge that then this ustomer premises access equipment is the enterprises ustomer premises access equipment, allow this ustomer premises access equipment to visit privately owned cloud data.
Compared to prior art; Cloud data security managing and control system provided by the invention and method combine current latitude and longitude coordinates information and other authority managing and controlling data of ustomer premises access equipment of the privately owned cloud data of request visit that this ustomer premises access equipment is carried out multiple-authentication; Strengthen the security management and control of privately owned cloud, more effectively taken precautions against invador's attack.
Description of drawings
Fig. 1 is the applied environment figure of cloud data security managing and control system of the present invention preferred embodiment.
Fig. 2 is the functional block diagram of cloud data security managing and control system of the present invention preferred embodiment.
Fig. 3 is the flow chart of cloud data security management-control method of the present invention preferred embodiment.
Fig. 4 is the sketch map of the privately owned cloud validated user end latitude and longitude coordinates that shows on the electronic chart.
The main element symbol description
Privately owned Cloud Server 10
Internal user end equipment 20
Fire compartment wall 30
External network 40
External user end equipment 50
Cloud data security managing and control system 100
Module is set 110
Memory module 120
Receiver module 130
Authentication module 140
Memory 150
Processor 160
Electronic chart 170
Embodiment
Consulting shown in Figure 1ly, is the applied environment figure of cloud data security managing and control system of the present invention 100 preferred embodiments.This cloud data security managing and control system 100 is applied to privately owned Cloud Server 10.This privately owned Cloud Server 10 is used to store privately owned cloud data, for example enterprises information such as enterprises organizational affiliation, wages framework, sales data, financial statement and customer data.This privately owned Cloud Server 10 is erected at after the fire compartment wall 30, and the internal user end equipment 20 of enterprise is visited the privately owned cloud data of privately owned Cloud Server 10 storages through internal network.Fire compartment wall 30 is used to resist the attack that external user end equipment 50 is initiated through 40 pairs of privately owned clouds of external network.
Privately owned Cloud Server 10 also is used for visiting the number of the account and the password of privately owned cloud data to each internal user end equipment 20 distributing IP address, and has the access rights of different brackets according to IP address or number of the account and 20 pairs of privately owned cloud data of password setting internal user end equipment.
Wherein, the internal user end equipment 20 of each enterprise is equipped with global positioning system (global positioning system GPS), is used to locate the latitude and longitude coordinates of each internal user end equipment 20 current present position.When privately owned Cloud Server 10 receives the access request of user side (internal user end or external user end) equipment, this user side is carried out multiple-authentication in conjunction with latitude and longitude coordinates information and other authority managing and controlling data (for example IP address, user account and password etc.) that user side is current.If this user side has any authentication failed, the access request of then privately owned Cloud Server 10 these ustomer premises access equipments of refusal.If the latitude and longitude coordinates information that ustomer premises access equipment is current and other authority managing and controlling data are all through checking, then privately owned Cloud Server 10 allows this ustomer premises access equipment to visit privately owned cloud data.
Consulting shown in Figure 2ly, is the functional block diagram of cloud data security managing and control system of the present invention 100 preferred embodiments.This cloud data security managing and control system 100 comprises module 110, memory module 120, receiver module 130 and authentication module 140 is set.The sequencing code storage of module 110 to 140 is in the memory 150 of privately owned Cloud Server 10, and the processor 160 of privately owned Cloud Server 10 is carried out these sequencing codes, realizes the above-mentioned functions that cloud data security managing and control system 100 provides.Privately owned Cloud Server 10 also stores Figure 170 electronically, this electronically Figure 170 can show the latitude and longitude coordinates information in geographical position.
Module 110 is set is used to be provided with the latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment 20 of access rights.The latitude and longitude coordinates scope is set can be with reference to the latitude and longitude coordinates information of building (for example factory building, office building etc.) the institute coverage of the enterprise of the privately owned cloud of use of demonstration on the electronic chart 170.As shown in Figure 4; In the latitude and longitude coordinates scope that the building institute coverage of the enterprise of the privately owned cloud of use that shows on Figure 170 electronically " H company " quadrilateral area that " A, B, C, D " four location points constitute of serving as reasons, the latitude and longitude coordinates of enterprises ustomer premises access equipment 20 all fall into this quadrilateral area and covered.Module 110 is set also to be used to be provided with 20 pairs of privately owned cloud data of internal user end equipment and to have the access rights of different brackets.
Memory module 120 is used for the latitude and longitude coordinates scope that is provided with and the access rights of different brackets are stored to memory 150.
Receiver module 130 is used to receive the request that ustomer premises access equipment is visited privately owned cloud data.
Authentication module 140 is used to check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server 10 is distributed to internal user end equipment 20.If there is any authorization information illegal, then authentication module 140 these ustomer premises access equipments of refusal are visited privately owned cloud data; If all authorization informations are all legal, then authentication module 140 judges that this ustomer premises access equipment is an enterprises ustomer premises access equipment 20, allows this ustomer premises access equipment to visit corresponding privately owned cloud data.
Authentication module 140 can be checked the latitude and longitude coordinates information that this ustomer premises access equipment is current earlier; If current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting; Reexamine the IP address of this ustomer premises access equipment; If the IP address is also legal, further require this client user to input number of the account again and password is verified.Authentication module 140 can check earlier also whether the IP address of this ustomer premises access equipment is legal; Whether reexamine the current latitude and longitude coordinates information of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting; If current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, further require this ustomer premises access equipment input number of the account and password to verify again.
Fig. 3 is the flow chart of cloud data security management-control method of the present invention preferred embodiment.Need to prove that the execution sequence of step can change among Fig. 3, for example the order of current latitude and longitude coordinates, IP address, number of the account and the password of the ustomer premises access equipment of the privately owned cloud data of checking request visit can be adjusted.
Step S301, on all internal user end equipment 20 that privately owned cloud data had access rights, install global positioning system (global positioning system, GPS).
Step S303 is provided with the latitude and longitude coordinates scope that module 110 is provided with the ustomer premises access equipment with the privately owned cloud data of visit, and memory module 120 is with latitude and longitude coordinates range storage to the memory 150 that is provided with.The latitude and longitude coordinates scope is set can be with reference to the latitude and longitude coordinates information of building (for example factory building, office building etc.) the institute coverage of the enterprise of the privately owned cloud of use of demonstration on the electronic chart 170.As shown in Figure 4; In the latitude and longitude coordinates scope that the building institute coverage of the enterprise of the privately owned cloud of use that shows on Figure 170 electronically " H company " quadrilateral area that " A, B, C, D " four location points constitute of serving as reasons, the latitude and longitude coordinates of enterprises ustomer premises access equipment 20 all fall into this quadrilateral area and covered.
Step S305, receiver module 130 receives the request that ustomer premises access equipment is visited privately owned cloud data.
Step S307, authentication module 140 these ustomer premises access equipments of request send current latitude and longitude coordinates information.
Step S309, whether authentication module 140 inspections receive the current latitude and longitude coordinates information that this ustomer premises access equipment sends.If do not receive the current latitude and longitude coordinates information that this ustomer premises access equipment sends; Then flow process gets into step S311; Authentication module 140 judges that this ustomer premises access equipment is not an enterprises ustomer premises access equipment 20, refuses the privately owned cloud data that this ustomer premises access equipment is visited privately owned Cloud Server 10 storages.Flow process finishes afterwards.If authentication module 140 is received the current latitude and longitude coordinates information that this ustomer premises access equipment sends, then flow process gets into step S313.
Step S313, whether the current latitude and longitude coordinates information of authentication module 140 these ustomer premises access equipments of inspection falls in the latitude and longitude coordinates scope of setting.If the current latitude and longitude coordinates information of this ustomer premises access equipment falls into outside the latitude and longitude coordinates scope of setting, then flow process gets into step S311.If the current latitude and longitude coordinates information of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, then flow process gets into step S315.
Step S315, whether other authorization information of authentication module 140 these ustomer premises access equipments of inspection is legal, and for example whether IP address, number of the account and the password of this ustomer premises access equipment are IP address, number of the account and the password that privately owned Cloud Server 10 is distributed to internal user end equipment 20.If other authorization information is illegal arbitrarily, for example the IP address is illegal, and perhaps number of the account and password are illegal, and then flow process gets into step S311.If all other authorization informations are all legal; Then flow process is carried out step S317; Authentication module 140 judges that this ustomer premises access equipment is an enterprises ustomer premises access equipment 20, visits the corresponding privately owned cloud data of privately owned Cloud Server 10 storages according to this ustomer premises access equipment of access rights permission of this internal user end equipment 20.
What should explain at last is; Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although the present invention is specified with reference to preferred embodiment; Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and the scope of technical scheme of the present invention.

Claims (10)

1. cloud data security managing and control system; Be applied to privately owned Cloud Server; The enterprises ustomer premises access equipment is through this privately owned Cloud Server of internal network visit, and this privately owned Cloud Server stores privately owned cloud data, it is characterized in that; Each enterprises ustomer premises access equipment is equipped with global positioning system, and this cloud data security managing and control system comprises:
Module is set, is used to be provided with the latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment of access rights;
Memory module is used for the latitude and longitude coordinates range storage that is provided with to privately owned Cloud Server;
Receiver module is used to receive the request that a ustomer premises access equipment is visited privately owned cloud data;
Authentication module; Be used to check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server is distributed to internal user end equipment, if there is any authorization information illegal; Then refuse this ustomer premises access equipment and visit privately owned cloud data; If all authorization informations are all legal, judge that then this ustomer premises access equipment is the enterprises ustomer premises access equipment, allow this ustomer premises access equipment to visit privately owned cloud data.
2. cloud data security managing and control system as claimed in claim 1; It is characterized in that; This privately owned Cloud Server also stores electronic chart, saidly module is set the latitude and longitude coordinates scope is set is the latitude and longitude coordinates information with reference to the building institute coverage of the enterprise of the privately owned cloud of use that shows on the electronic chart.
3. cloud data security managing and control system as claimed in claim 1 is characterized in that, the said module that is provided with also is used to be provided with internal user end equipment privately owned cloud data are had the access rights of different brackets.
4. cloud data security managing and control system as claimed in claim 1; It is characterized in that; Said authentication module is the current latitude and longitude coordinates information of this ustomer premises access equipment of inspection earlier, if current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, reexamines the IP address of this ustomer premises access equipment; If the IP address is also legal, further require this ustomer premises access equipment input number of the account and password to verify again.
5. cloud data security managing and control system as claimed in claim 1; It is characterized in that; Said authentication module checks earlier whether the IP address of this ustomer premises access equipment is legal, if the IP address is legal, reexamines the current latitude and longitude coordinates information of this ustomer premises access equipment and whether falls in the latitude and longitude coordinates scope of setting; If current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, further require this ustomer premises access equipment input number of the account and password to verify again.
6. cloud data security management-control method; Be applied to privately owned Cloud Server; The enterprises user side is through this privately owned Cloud Server of internal network visit, and this privately owned Cloud Server stores privately owned cloud data, it is characterized in that; Each enterprises ustomer premises access equipment is equipped with global positioning system, and this method comprises:
The latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment of access rights is set;
With the latitude and longitude coordinates range storage that is provided with to privately owned Cloud Server;
Receive a ustomer premises access equipment and visit the request of privately owned cloud data;
Check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server is distributed to internal user end equipment;
If there is any authorization information illegal, then refuse this ustomer premises access equipment and visit privately owned cloud data, if all authorization informations are all legal, judge that then this ustomer premises access equipment is the enterprises ustomer premises access equipment, allow this ustomer premises access equipment to visit privately owned cloud data.
7. cloud data security management-control method as claimed in claim 6; It is characterized in that; This privately owned Cloud Server also stores electronic chart, the latitude and longitude coordinates scope is set is the latitude and longitude coordinates information with reference to the building institute coverage of the enterprise of the privately owned cloud of use that shows on the electronic chart.
8. cloud data security management-control method as claimed in claim 6 is characterized in that, this method comprises that also step is provided with internal user end equipment privately owned cloud data are had the access rights of different brackets.
9. cloud data security management-control method as claimed in claim 6; It is characterized in that; This method is the current latitude and longitude coordinates information of this ustomer premises access equipment of inspection earlier, if current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, reexamines the IP address of this ustomer premises access equipment; If the IP address is also legal, further require this ustomer premises access equipment input number of the account and password to verify again.
10. cloud data security management-control method as claimed in claim 6; It is characterized in that; This method checks earlier whether the IP address of this ustomer premises access equipment is legal, if the IP address is legal, reexamines the current latitude and longitude coordinates information of this ustomer premises access equipment and whether falls in the latitude and longitude coordinates scope of setting; If current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, further require this ustomer premises access equipment input number of the account and password to verify again.
CN2010106021910A 2010-12-23 2010-12-23 Security control system and security control method for cloud data Pending CN102571703A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010106021910A CN102571703A (en) 2010-12-23 2010-12-23 Security control system and security control method for cloud data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010106021910A CN102571703A (en) 2010-12-23 2010-12-23 Security control system and security control method for cloud data

Publications (1)

Publication Number Publication Date
CN102571703A true CN102571703A (en) 2012-07-11

Family

ID=46416191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010106021910A Pending CN102571703A (en) 2010-12-23 2010-12-23 Security control system and security control method for cloud data

Country Status (1)

Country Link
CN (1) CN102571703A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067406A (en) * 2013-01-14 2013-04-24 暨南大学 Access control system and access control method between public cloud and private cloud
CN103107908A (en) * 2013-01-07 2013-05-15 安大半导体有限公司 Network server and control method thereof
CN103327084A (en) * 2013-06-08 2013-09-25 北京古盘创世科技发展有限公司 Public and private hybrid distributed cloud storage system and cloud storage method
WO2014079266A1 (en) * 2012-11-26 2014-05-30 北京奇虎科技有限公司 Security data processing method and system
CN103945330A (en) * 2014-05-12 2014-07-23 重庆邮电大学 Virtual private cloud platform and virtual private cloud secure access method and system
WO2015018059A1 (en) * 2013-08-09 2015-02-12 Empire Technology Development Llc Data cache on cloud platform
CN105404796A (en) * 2015-10-21 2016-03-16 浪潮电子信息产业股份有限公司 JavaScript source file protection method and apparatus
CN106096436A (en) * 2016-05-30 2016-11-09 深圳市永兴元科技有限公司 Cloud data managing method and device
US20160364576A1 (en) * 2012-03-06 2016-12-15 Microsoft Technology Licensing, Llc Operating large scale systems and cloud services with zero-standing elevated permissions
CN106453390A (en) * 2016-11-11 2017-02-22 北京邮电大学 Cloud storage system
CN106650490A (en) * 2016-10-25 2017-05-10 广东欧珀移动通信有限公司 Cloud account number login method and device
CN106685912A (en) * 2016-08-09 2017-05-17 厦门天锐科技股份有限公司 Secure access method of application system
US9762585B2 (en) 2015-03-19 2017-09-12 Microsoft Technology Licensing, Llc Tenant lockbox
CN109214206A (en) * 2018-08-01 2019-01-15 武汉普利商用机器有限公司 cloud backup storage system and method
CN109922128A (en) * 2019-01-08 2019-06-21 中金数据(武汉)超算技术有限公司 A kind of data safety exchange method suitable for across cloud service deployment environment
CN110826101A (en) * 2019-11-05 2020-02-21 安徽数据堂科技有限公司 Privatization deployment data processing method for enterprise
CN111262865A (en) * 2016-09-23 2020-06-09 华为技术有限公司 Method, device and system for making access control strategy
US10931682B2 (en) 2015-06-30 2021-02-23 Microsoft Technology Licensing, Llc Privileged identity management
WO2022000156A1 (en) * 2020-06-29 2022-01-06 Microsoft Technology Licensing, Llc Selective security augmentation in source control environments

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1673925A (en) * 2004-03-24 2005-09-28 美国博通公司 Global positioning system (gps) based secure access
CN101409620A (en) * 2007-10-12 2009-04-15 美国博通公司 Method and system for processing data in communication system
WO2010132067A1 (en) * 2009-05-12 2010-11-18 Hewlett-Packard Development Company, L.P. Location determined network access

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1673925A (en) * 2004-03-24 2005-09-28 美国博通公司 Global positioning system (gps) based secure access
CN101409620A (en) * 2007-10-12 2009-04-15 美国博通公司 Method and system for processing data in communication system
WO2010132067A1 (en) * 2009-05-12 2010-11-18 Hewlett-Packard Development Company, L.P. Location determined network access

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160364576A1 (en) * 2012-03-06 2016-12-15 Microsoft Technology Licensing, Llc Operating large scale systems and cloud services with zero-standing elevated permissions
WO2014079266A1 (en) * 2012-11-26 2014-05-30 北京奇虎科技有限公司 Security data processing method and system
CN103107908A (en) * 2013-01-07 2013-05-15 安大半导体有限公司 Network server and control method thereof
CN103067406B (en) * 2013-01-14 2015-07-22 暨南大学 Access control system and access control method between public cloud and private cloud
CN103067406A (en) * 2013-01-14 2013-04-24 暨南大学 Access control system and access control method between public cloud and private cloud
CN103327084A (en) * 2013-06-08 2013-09-25 北京古盘创世科技发展有限公司 Public and private hybrid distributed cloud storage system and cloud storage method
WO2015018059A1 (en) * 2013-08-09 2015-02-12 Empire Technology Development Llc Data cache on cloud platform
CN103945330B (en) * 2014-05-12 2017-10-27 重庆邮电大学 Virtual private cloud platform, virtual private cloud safety access method and system
CN103945330A (en) * 2014-05-12 2014-07-23 重庆邮电大学 Virtual private cloud platform and virtual private cloud secure access method and system
US11075917B2 (en) 2015-03-19 2021-07-27 Microsoft Technology Licensing, Llc Tenant lockbox
US9762585B2 (en) 2015-03-19 2017-09-12 Microsoft Technology Licensing, Llc Tenant lockbox
US10931682B2 (en) 2015-06-30 2021-02-23 Microsoft Technology Licensing, Llc Privileged identity management
CN105404796A (en) * 2015-10-21 2016-03-16 浪潮电子信息产业股份有限公司 JavaScript source file protection method and apparatus
CN106096436A (en) * 2016-05-30 2016-11-09 深圳市永兴元科技有限公司 Cloud data managing method and device
CN106685912A (en) * 2016-08-09 2017-05-17 厦门天锐科技股份有限公司 Secure access method of application system
CN106685912B (en) * 2016-08-09 2020-06-12 厦门天锐科技股份有限公司 Safety access method of application system
CN111262865A (en) * 2016-09-23 2020-06-09 华为技术有限公司 Method, device and system for making access control strategy
CN106650490B (en) * 2016-10-25 2019-07-23 Oppo广东移动通信有限公司 The login method and device of cloud account
CN106650490A (en) * 2016-10-25 2017-05-10 广东欧珀移动通信有限公司 Cloud account number login method and device
CN106453390B (en) * 2016-11-11 2019-10-18 北京邮电大学 A kind of cloud storage system
CN106453390A (en) * 2016-11-11 2017-02-22 北京邮电大学 Cloud storage system
CN109214206A (en) * 2018-08-01 2019-01-15 武汉普利商用机器有限公司 cloud backup storage system and method
CN109922128A (en) * 2019-01-08 2019-06-21 中金数据(武汉)超算技术有限公司 A kind of data safety exchange method suitable for across cloud service deployment environment
CN110826101A (en) * 2019-11-05 2020-02-21 安徽数据堂科技有限公司 Privatization deployment data processing method for enterprise
CN110826101B (en) * 2019-11-05 2021-01-05 安徽数据堂科技有限公司 Privatization deployment data processing method for enterprise
WO2022000156A1 (en) * 2020-06-29 2022-01-06 Microsoft Technology Licensing, Llc Selective security augmentation in source control environments

Similar Documents

Publication Publication Date Title
CN102571703A (en) Security control system and security control method for cloud data
US10607190B2 (en) Mobile check-in with push notification services
US8505107B2 (en) Cloud server and access management method
CN105656903B (en) A kind of user safety management system of Hive platforms and application
US9491183B1 (en) Geographic location-based policy
CN102427484B (en) Determine whether equipment is in the method and apparatus of network internal based on DNS
US9491165B2 (en) Providing a service based on time and location based passwords
US10003975B2 (en) Authorized areas of authentication
CN102571859A (en) System and method for controlling robot through cloud computation
US9516504B2 (en) Intelligent role based access control based on trustee approvals
US20240121086A1 (en) Security key for geographical locations
US20140229603A1 (en) Validation of service management requests of a mobile device in a geographically bounded space
CN103366255A (en) Innovative social management intelligent network platform
CN105100034A (en) Method and apparatus for an access function in network applications
CN103514552A (en) System and method for performing shopping through cloud computing and mobile device
US11651637B2 (en) Method, system and apparatus for equipment monitoring and access control
Shivers et al. Ride-hailing for autonomous vehicles: Hyperledger fabric-based secure and decentralize blockchain platform
CN106487770B (en) Method for authenticating and authentication device
CN103593591B (en) A kind of user profile access control method based on RBAC access control model
CN103505840A (en) System and method for fire protection inspection through cloud computing and mobile device
KR101059058B1 (en) Apparatus, method and system for service access control based on user location
CN103152319A (en) Cloud maintenance, and method and system for authorization
CN103049707A (en) Android platform based GPS (global positioning system) data intercepting control method
KR20200007349A (en) Method for managing wireless network based on block chain and the system thereof
JP7254822B2 (en) Systems, methods, and apparatus for provisioning and processing geolocation information for computerized devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120711