CN102571703A - Security control system and security control method for cloud data - Google Patents
Security control system and security control method for cloud data Download PDFInfo
- Publication number
- CN102571703A CN102571703A CN2010106021910A CN201010602191A CN102571703A CN 102571703 A CN102571703 A CN 102571703A CN 2010106021910 A CN2010106021910 A CN 2010106021910A CN 201010602191 A CN201010602191 A CN 201010602191A CN 102571703 A CN102571703 A CN 102571703A
- Authority
- CN
- China
- Prior art keywords
- privately owned
- ustomer premises
- access equipment
- cloud data
- premises access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a security control system for cloud data. The security control system is applied to a private cloud server. Enterprise internal customer premises equipment accesses the private cloud server through an internal network; the private cloud server is used for storing private cloud data; and each internal customer premises equipment is provided with a global positioning system. The security control system can be used for carrying out multiple validation on the client by combining with current longitude and latitude attribute coordinate information and other permission control. If anyone validation of the customer premises equipment is failed, the security control system for the cloud data refuses an access request of the client equipment. If the current longitude and latitude attribute coordinate information and the other permission control information of the customer premises equipment respectively pass the validation, the security control system for the cloud data allows the customer premises equipment to access the private cloud data. The invention also provides a security control method for the cloud data.
Description
Technical field
The present invention relates to a kind of data security managing and control system and method, especially about a kind of cloud data security managing and control system and method.
Background technology
Cloud computing (cloud computing) is a kind of compute mode based on the Internet, and in this way, software and hardware resources and data can be shared between the network equipment.So-called cloud computing environment is exactly a kind of metaphor saying of network environment in fact.In cloud computing environment, in server, the user can see through browser or information is obtained in other network services with software and hardware resources and data storing for the operator.According to the setting of rights of using, cloud computing environment can be divided into two kinds in publicly-owned cloud and privately owned cloud.Publicly-owned cloud is meant through network provides the exterior of enterprise client extendible and flexible service, and this type of service maybe be for free or with low cost.Privately owned cloud is the service object with the enterprises client then, is applied to enterprises mostly, and after generally being structured in the fire compartment wall of enterprise.
The information that privately owned cloud stores relates to enterprise's secret mostly, for example enterprises organizational affiliation, sales data, financial statement and customer data etc.Therefore, the security management and control to privately owned cloud seems very important.At present, the information that is structured in the privately owned cloud behind the fire compartment wall of enterprise and generally privately owned cloud the is provided authority managing and controlling that conducts interviews with IP address or user account number and password.Its weak point is that the invador possibly break through the security perimeter of fire compartment wall through IP address, account and the password of camouflage validated user.
Summary of the invention
In view of above content, be necessary to provide a kind of cloud data security managing and control system and method, can strengthen the security management and control of privately owned cloud, more effectively take precautions against invador's attack.
A kind of cloud data security managing and control system; Be applied to privately owned Cloud Server; The enterprises ustomer premises access equipment is through this privately owned Cloud Server of internal network visit, and this privately owned Cloud Server stores privately owned cloud data, and each enterprises ustomer premises access equipment is equipped with global positioning system.This cloud data security managing and control system comprises: module, memory module, receiver module and authentication module are set.Module is set is used to be provided with the latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment of access rights.Memory module is used for the latitude and longitude coordinates range storage that is provided with to privately owned Cloud Server.Receiver module is used to receive the request that a ustomer premises access equipment is visited privately owned cloud data.Authentication module is used to check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server is distributed to internal user end equipment.If there is any authorization information illegal, then this ustomer premises access equipment of authentication module refusal is visited privately owned cloud data; If all authorization informations are all legal, then authentication module judges that this ustomer premises access equipment is the enterprises ustomer premises access equipment, allows this ustomer premises access equipment to visit privately owned cloud data.
A kind of cloud data security management-control method is applied to privately owned Cloud Server, and the enterprises user side is through this privately owned Cloud Server of internal network visit, and this privately owned Cloud Server stores privately owned cloud data, and each enterprises ustomer premises access equipment is equipped with global positioning system.This method comprises: the latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment of access rights (A) is set; (B) with the latitude and longitude coordinates range storage that is provided with to privately owned Cloud Server; (C) receive the request that a ustomer premises access equipment is visited privately owned cloud data; (D) check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server is distributed to internal user end subscriber end; And (E) if there is any authorization information illegal, then refuses this ustomer premises access equipment and visit privately owned cloud data, if all authorization informations are all legal, judge that then this ustomer premises access equipment is the enterprises ustomer premises access equipment, allow this ustomer premises access equipment to visit privately owned cloud data.
Compared to prior art; Cloud data security managing and control system provided by the invention and method combine current latitude and longitude coordinates information and other authority managing and controlling data of ustomer premises access equipment of the privately owned cloud data of request visit that this ustomer premises access equipment is carried out multiple-authentication; Strengthen the security management and control of privately owned cloud, more effectively taken precautions against invador's attack.
Description of drawings
Fig. 1 is the applied environment figure of cloud data security managing and control system of the present invention preferred embodiment.
Fig. 2 is the functional block diagram of cloud data security managing and control system of the present invention preferred embodiment.
Fig. 3 is the flow chart of cloud data security management-control method of the present invention preferred embodiment.
Fig. 4 is the sketch map of the privately owned cloud validated user end latitude and longitude coordinates that shows on the electronic chart.
The main element symbol description
Privately owned Cloud Server | 10 |
Internal |
20 |
|
30 |
|
40 |
External |
50 |
Cloud data security managing and control system | 100 |
Module is set | 110 |
Memory module | 120 |
Receiver module | 130 |
Authentication module | 140 |
Memory | 150 |
Processor | 160 |
Electronic chart | 170 |
Embodiment
Consulting shown in Figure 1ly, is the applied environment figure of cloud data security managing and control system of the present invention 100 preferred embodiments.This cloud data security managing and control system 100 is applied to privately owned Cloud Server 10.This privately owned Cloud Server 10 is used to store privately owned cloud data, for example enterprises information such as enterprises organizational affiliation, wages framework, sales data, financial statement and customer data.This privately owned Cloud Server 10 is erected at after the fire compartment wall 30, and the internal user end equipment 20 of enterprise is visited the privately owned cloud data of privately owned Cloud Server 10 storages through internal network.Fire compartment wall 30 is used to resist the attack that external user end equipment 50 is initiated through 40 pairs of privately owned clouds of external network.
Privately owned Cloud Server 10 also is used for visiting the number of the account and the password of privately owned cloud data to each internal user end equipment 20 distributing IP address, and has the access rights of different brackets according to IP address or number of the account and 20 pairs of privately owned cloud data of password setting internal user end equipment.
Wherein, the internal user end equipment 20 of each enterprise is equipped with global positioning system (global positioning system GPS), is used to locate the latitude and longitude coordinates of each internal user end equipment 20 current present position.When privately owned Cloud Server 10 receives the access request of user side (internal user end or external user end) equipment, this user side is carried out multiple-authentication in conjunction with latitude and longitude coordinates information and other authority managing and controlling data (for example IP address, user account and password etc.) that user side is current.If this user side has any authentication failed, the access request of then privately owned Cloud Server 10 these ustomer premises access equipments of refusal.If the latitude and longitude coordinates information that ustomer premises access equipment is current and other authority managing and controlling data are all through checking, then privately owned Cloud Server 10 allows this ustomer premises access equipment to visit privately owned cloud data.
Consulting shown in Figure 2ly, is the functional block diagram of cloud data security managing and control system of the present invention 100 preferred embodiments.This cloud data security managing and control system 100 comprises module 110, memory module 120, receiver module 130 and authentication module 140 is set.The sequencing code storage of module 110 to 140 is in the memory 150 of privately owned Cloud Server 10, and the processor 160 of privately owned Cloud Server 10 is carried out these sequencing codes, realizes the above-mentioned functions that cloud data security managing and control system 100 provides.Privately owned Cloud Server 10 also stores Figure 170 electronically, this electronically Figure 170 can show the latitude and longitude coordinates information in geographical position.
Module 110 is set is used to be provided with the latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment 20 of access rights.The latitude and longitude coordinates scope is set can be with reference to the latitude and longitude coordinates information of building (for example factory building, office building etc.) the institute coverage of the enterprise of the privately owned cloud of use of demonstration on the electronic chart 170.As shown in Figure 4; In the latitude and longitude coordinates scope that the building institute coverage of the enterprise of the privately owned cloud of use that shows on Figure 170 electronically " H company " quadrilateral area that " A, B, C, D " four location points constitute of serving as reasons, the latitude and longitude coordinates of enterprises ustomer premises access equipment 20 all fall into this quadrilateral area and covered.Module 110 is set also to be used to be provided with 20 pairs of privately owned cloud data of internal user end equipment and to have the access rights of different brackets.
Memory module 120 is used for the latitude and longitude coordinates scope that is provided with and the access rights of different brackets are stored to memory 150.
Receiver module 130 is used to receive the request that ustomer premises access equipment is visited privately owned cloud data.
Authentication module 140 is used to check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server 10 is distributed to internal user end equipment 20.If there is any authorization information illegal, then authentication module 140 these ustomer premises access equipments of refusal are visited privately owned cloud data; If all authorization informations are all legal, then authentication module 140 judges that this ustomer premises access equipment is an enterprises ustomer premises access equipment 20, allows this ustomer premises access equipment to visit corresponding privately owned cloud data.
Authentication module 140 can be checked the latitude and longitude coordinates information that this ustomer premises access equipment is current earlier; If current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting; Reexamine the IP address of this ustomer premises access equipment; If the IP address is also legal, further require this client user to input number of the account again and password is verified.Authentication module 140 can check earlier also whether the IP address of this ustomer premises access equipment is legal; Whether reexamine the current latitude and longitude coordinates information of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting; If current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, further require this ustomer premises access equipment input number of the account and password to verify again.
Fig. 3 is the flow chart of cloud data security management-control method of the present invention preferred embodiment.Need to prove that the execution sequence of step can change among Fig. 3, for example the order of current latitude and longitude coordinates, IP address, number of the account and the password of the ustomer premises access equipment of the privately owned cloud data of checking request visit can be adjusted.
Step S301, on all internal user end equipment 20 that privately owned cloud data had access rights, install global positioning system (global positioning system, GPS).
Step S303 is provided with the latitude and longitude coordinates scope that module 110 is provided with the ustomer premises access equipment with the privately owned cloud data of visit, and memory module 120 is with latitude and longitude coordinates range storage to the memory 150 that is provided with.The latitude and longitude coordinates scope is set can be with reference to the latitude and longitude coordinates information of building (for example factory building, office building etc.) the institute coverage of the enterprise of the privately owned cloud of use of demonstration on the electronic chart 170.As shown in Figure 4; In the latitude and longitude coordinates scope that the building institute coverage of the enterprise of the privately owned cloud of use that shows on Figure 170 electronically " H company " quadrilateral area that " A, B, C, D " four location points constitute of serving as reasons, the latitude and longitude coordinates of enterprises ustomer premises access equipment 20 all fall into this quadrilateral area and covered.
Step S305, receiver module 130 receives the request that ustomer premises access equipment is visited privately owned cloud data.
Step S307, authentication module 140 these ustomer premises access equipments of request send current latitude and longitude coordinates information.
Step S309, whether authentication module 140 inspections receive the current latitude and longitude coordinates information that this ustomer premises access equipment sends.If do not receive the current latitude and longitude coordinates information that this ustomer premises access equipment sends; Then flow process gets into step S311; Authentication module 140 judges that this ustomer premises access equipment is not an enterprises ustomer premises access equipment 20, refuses the privately owned cloud data that this ustomer premises access equipment is visited privately owned Cloud Server 10 storages.Flow process finishes afterwards.If authentication module 140 is received the current latitude and longitude coordinates information that this ustomer premises access equipment sends, then flow process gets into step S313.
Step S313, whether the current latitude and longitude coordinates information of authentication module 140 these ustomer premises access equipments of inspection falls in the latitude and longitude coordinates scope of setting.If the current latitude and longitude coordinates information of this ustomer premises access equipment falls into outside the latitude and longitude coordinates scope of setting, then flow process gets into step S311.If the current latitude and longitude coordinates information of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, then flow process gets into step S315.
Step S315, whether other authorization information of authentication module 140 these ustomer premises access equipments of inspection is legal, and for example whether IP address, number of the account and the password of this ustomer premises access equipment are IP address, number of the account and the password that privately owned Cloud Server 10 is distributed to internal user end equipment 20.If other authorization information is illegal arbitrarily, for example the IP address is illegal, and perhaps number of the account and password are illegal, and then flow process gets into step S311.If all other authorization informations are all legal; Then flow process is carried out step S317; Authentication module 140 judges that this ustomer premises access equipment is an enterprises ustomer premises access equipment 20, visits the corresponding privately owned cloud data of privately owned Cloud Server 10 storages according to this ustomer premises access equipment of access rights permission of this internal user end equipment 20.
What should explain at last is; Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although the present invention is specified with reference to preferred embodiment; Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and the scope of technical scheme of the present invention.
Claims (10)
1. cloud data security managing and control system; Be applied to privately owned Cloud Server; The enterprises ustomer premises access equipment is through this privately owned Cloud Server of internal network visit, and this privately owned Cloud Server stores privately owned cloud data, it is characterized in that; Each enterprises ustomer premises access equipment is equipped with global positioning system, and this cloud data security managing and control system comprises:
Module is set, is used to be provided with the latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment of access rights;
Memory module is used for the latitude and longitude coordinates range storage that is provided with to privately owned Cloud Server;
Receiver module is used to receive the request that a ustomer premises access equipment is visited privately owned cloud data;
Authentication module; Be used to check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server is distributed to internal user end equipment, if there is any authorization information illegal; Then refuse this ustomer premises access equipment and visit privately owned cloud data; If all authorization informations are all legal, judge that then this ustomer premises access equipment is the enterprises ustomer premises access equipment, allow this ustomer premises access equipment to visit privately owned cloud data.
2. cloud data security managing and control system as claimed in claim 1; It is characterized in that; This privately owned Cloud Server also stores electronic chart, saidly module is set the latitude and longitude coordinates scope is set is the latitude and longitude coordinates information with reference to the building institute coverage of the enterprise of the privately owned cloud of use that shows on the electronic chart.
3. cloud data security managing and control system as claimed in claim 1 is characterized in that, the said module that is provided with also is used to be provided with internal user end equipment privately owned cloud data are had the access rights of different brackets.
4. cloud data security managing and control system as claimed in claim 1; It is characterized in that; Said authentication module is the current latitude and longitude coordinates information of this ustomer premises access equipment of inspection earlier, if current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, reexamines the IP address of this ustomer premises access equipment; If the IP address is also legal, further require this ustomer premises access equipment input number of the account and password to verify again.
5. cloud data security managing and control system as claimed in claim 1; It is characterized in that; Said authentication module checks earlier whether the IP address of this ustomer premises access equipment is legal, if the IP address is legal, reexamines the current latitude and longitude coordinates information of this ustomer premises access equipment and whether falls in the latitude and longitude coordinates scope of setting; If current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, further require this ustomer premises access equipment input number of the account and password to verify again.
6. cloud data security management-control method; Be applied to privately owned Cloud Server; The enterprises user side is through this privately owned Cloud Server of internal network visit, and this privately owned Cloud Server stores privately owned cloud data, it is characterized in that; Each enterprises ustomer premises access equipment is equipped with global positioning system, and this method comprises:
The latitude and longitude coordinates scope that privately owned cloud data is had the internal user end equipment of access rights is set;
With the latitude and longitude coordinates range storage that is provided with to privately owned Cloud Server;
Receive a ustomer premises access equipment and visit the request of privately owned cloud data;
Check whether this ustomer premises access equipment is visited the authorization information of privately owned cloud data legal; Comprise whether the current latitude and longitude coordinates of this ustomer premises access equipment falls in the latitude and longitude coordinates scope of setting, and whether IP address, number of the account and the password of this ustomer premises access equipment is IP address, number of the account and the password that privately owned Cloud Server is distributed to internal user end equipment;
If there is any authorization information illegal, then refuse this ustomer premises access equipment and visit privately owned cloud data, if all authorization informations are all legal, judge that then this ustomer premises access equipment is the enterprises ustomer premises access equipment, allow this ustomer premises access equipment to visit privately owned cloud data.
7. cloud data security management-control method as claimed in claim 6; It is characterized in that; This privately owned Cloud Server also stores electronic chart, the latitude and longitude coordinates scope is set is the latitude and longitude coordinates information with reference to the building institute coverage of the enterprise of the privately owned cloud of use that shows on the electronic chart.
8. cloud data security management-control method as claimed in claim 6 is characterized in that, this method comprises that also step is provided with internal user end equipment privately owned cloud data are had the access rights of different brackets.
9. cloud data security management-control method as claimed in claim 6; It is characterized in that; This method is the current latitude and longitude coordinates information of this ustomer premises access equipment of inspection earlier, if current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, reexamines the IP address of this ustomer premises access equipment; If the IP address is also legal, further require this ustomer premises access equipment input number of the account and password to verify again.
10. cloud data security management-control method as claimed in claim 6; It is characterized in that; This method checks earlier whether the IP address of this ustomer premises access equipment is legal, if the IP address is legal, reexamines the current latitude and longitude coordinates information of this ustomer premises access equipment and whether falls in the latitude and longitude coordinates scope of setting; If current latitude and longitude coordinates falls in the latitude and longitude coordinates scope of setting, further require this ustomer premises access equipment input number of the account and password to verify again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010106021910A CN102571703A (en) | 2010-12-23 | 2010-12-23 | Security control system and security control method for cloud data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010106021910A CN102571703A (en) | 2010-12-23 | 2010-12-23 | Security control system and security control method for cloud data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102571703A true CN102571703A (en) | 2012-07-11 |
Family
ID=46416191
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010106021910A Pending CN102571703A (en) | 2010-12-23 | 2010-12-23 | Security control system and security control method for cloud data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102571703A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067406A (en) * | 2013-01-14 | 2013-04-24 | 暨南大学 | Access control system and access control method between public cloud and private cloud |
CN103107908A (en) * | 2013-01-07 | 2013-05-15 | 安大半导体有限公司 | Network server and control method thereof |
CN103327084A (en) * | 2013-06-08 | 2013-09-25 | 北京古盘创世科技发展有限公司 | Public and private hybrid distributed cloud storage system and cloud storage method |
WO2014079266A1 (en) * | 2012-11-26 | 2014-05-30 | 北京奇虎科技有限公司 | Security data processing method and system |
CN103945330A (en) * | 2014-05-12 | 2014-07-23 | 重庆邮电大学 | Virtual private cloud platform and virtual private cloud secure access method and system |
WO2015018059A1 (en) * | 2013-08-09 | 2015-02-12 | Empire Technology Development Llc | Data cache on cloud platform |
CN105404796A (en) * | 2015-10-21 | 2016-03-16 | 浪潮电子信息产业股份有限公司 | JavaScript source file protection method and apparatus |
CN106096436A (en) * | 2016-05-30 | 2016-11-09 | 深圳市永兴元科技有限公司 | Cloud data managing method and device |
US20160364576A1 (en) * | 2012-03-06 | 2016-12-15 | Microsoft Technology Licensing, Llc | Operating large scale systems and cloud services with zero-standing elevated permissions |
CN106453390A (en) * | 2016-11-11 | 2017-02-22 | 北京邮电大学 | Cloud storage system |
CN106650490A (en) * | 2016-10-25 | 2017-05-10 | 广东欧珀移动通信有限公司 | Cloud account number login method and device |
CN106685912A (en) * | 2016-08-09 | 2017-05-17 | 厦门天锐科技股份有限公司 | Secure access method of application system |
US9762585B2 (en) | 2015-03-19 | 2017-09-12 | Microsoft Technology Licensing, Llc | Tenant lockbox |
CN109214206A (en) * | 2018-08-01 | 2019-01-15 | 武汉普利商用机器有限公司 | cloud backup storage system and method |
CN109922128A (en) * | 2019-01-08 | 2019-06-21 | 中金数据(武汉)超算技术有限公司 | A kind of data safety exchange method suitable for across cloud service deployment environment |
CN110826101A (en) * | 2019-11-05 | 2020-02-21 | 安徽数据堂科技有限公司 | Privatization deployment data processing method for enterprise |
CN111262865A (en) * | 2016-09-23 | 2020-06-09 | 华为技术有限公司 | Method, device and system for making access control strategy |
US10931682B2 (en) | 2015-06-30 | 2021-02-23 | Microsoft Technology Licensing, Llc | Privileged identity management |
WO2022000156A1 (en) * | 2020-06-29 | 2022-01-06 | Microsoft Technology Licensing, Llc | Selective security augmentation in source control environments |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1673925A (en) * | 2004-03-24 | 2005-09-28 | 美国博通公司 | Global positioning system (gps) based secure access |
CN101409620A (en) * | 2007-10-12 | 2009-04-15 | 美国博通公司 | Method and system for processing data in communication system |
WO2010132067A1 (en) * | 2009-05-12 | 2010-11-18 | Hewlett-Packard Development Company, L.P. | Location determined network access |
-
2010
- 2010-12-23 CN CN2010106021910A patent/CN102571703A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1673925A (en) * | 2004-03-24 | 2005-09-28 | 美国博通公司 | Global positioning system (gps) based secure access |
CN101409620A (en) * | 2007-10-12 | 2009-04-15 | 美国博通公司 | Method and system for processing data in communication system |
WO2010132067A1 (en) * | 2009-05-12 | 2010-11-18 | Hewlett-Packard Development Company, L.P. | Location determined network access |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160364576A1 (en) * | 2012-03-06 | 2016-12-15 | Microsoft Technology Licensing, Llc | Operating large scale systems and cloud services with zero-standing elevated permissions |
WO2014079266A1 (en) * | 2012-11-26 | 2014-05-30 | 北京奇虎科技有限公司 | Security data processing method and system |
CN103107908A (en) * | 2013-01-07 | 2013-05-15 | 安大半导体有限公司 | Network server and control method thereof |
CN103067406B (en) * | 2013-01-14 | 2015-07-22 | 暨南大学 | Access control system and access control method between public cloud and private cloud |
CN103067406A (en) * | 2013-01-14 | 2013-04-24 | 暨南大学 | Access control system and access control method between public cloud and private cloud |
CN103327084A (en) * | 2013-06-08 | 2013-09-25 | 北京古盘创世科技发展有限公司 | Public and private hybrid distributed cloud storage system and cloud storage method |
WO2015018059A1 (en) * | 2013-08-09 | 2015-02-12 | Empire Technology Development Llc | Data cache on cloud platform |
CN103945330B (en) * | 2014-05-12 | 2017-10-27 | 重庆邮电大学 | Virtual private cloud platform, virtual private cloud safety access method and system |
CN103945330A (en) * | 2014-05-12 | 2014-07-23 | 重庆邮电大学 | Virtual private cloud platform and virtual private cloud secure access method and system |
US11075917B2 (en) | 2015-03-19 | 2021-07-27 | Microsoft Technology Licensing, Llc | Tenant lockbox |
US9762585B2 (en) | 2015-03-19 | 2017-09-12 | Microsoft Technology Licensing, Llc | Tenant lockbox |
US10931682B2 (en) | 2015-06-30 | 2021-02-23 | Microsoft Technology Licensing, Llc | Privileged identity management |
CN105404796A (en) * | 2015-10-21 | 2016-03-16 | 浪潮电子信息产业股份有限公司 | JavaScript source file protection method and apparatus |
CN106096436A (en) * | 2016-05-30 | 2016-11-09 | 深圳市永兴元科技有限公司 | Cloud data managing method and device |
CN106685912A (en) * | 2016-08-09 | 2017-05-17 | 厦门天锐科技股份有限公司 | Secure access method of application system |
CN106685912B (en) * | 2016-08-09 | 2020-06-12 | 厦门天锐科技股份有限公司 | Safety access method of application system |
CN111262865A (en) * | 2016-09-23 | 2020-06-09 | 华为技术有限公司 | Method, device and system for making access control strategy |
CN106650490B (en) * | 2016-10-25 | 2019-07-23 | Oppo广东移动通信有限公司 | The login method and device of cloud account |
CN106650490A (en) * | 2016-10-25 | 2017-05-10 | 广东欧珀移动通信有限公司 | Cloud account number login method and device |
CN106453390B (en) * | 2016-11-11 | 2019-10-18 | 北京邮电大学 | A kind of cloud storage system |
CN106453390A (en) * | 2016-11-11 | 2017-02-22 | 北京邮电大学 | Cloud storage system |
CN109214206A (en) * | 2018-08-01 | 2019-01-15 | 武汉普利商用机器有限公司 | cloud backup storage system and method |
CN109922128A (en) * | 2019-01-08 | 2019-06-21 | 中金数据(武汉)超算技术有限公司 | A kind of data safety exchange method suitable for across cloud service deployment environment |
CN110826101A (en) * | 2019-11-05 | 2020-02-21 | 安徽数据堂科技有限公司 | Privatization deployment data processing method for enterprise |
CN110826101B (en) * | 2019-11-05 | 2021-01-05 | 安徽数据堂科技有限公司 | Privatization deployment data processing method for enterprise |
WO2022000156A1 (en) * | 2020-06-29 | 2022-01-06 | Microsoft Technology Licensing, Llc | Selective security augmentation in source control environments |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102571703A (en) | Security control system and security control method for cloud data | |
US10607190B2 (en) | Mobile check-in with push notification services | |
US8505107B2 (en) | Cloud server and access management method | |
CN105656903B (en) | A kind of user safety management system of Hive platforms and application | |
US9491183B1 (en) | Geographic location-based policy | |
CN102427484B (en) | Determine whether equipment is in the method and apparatus of network internal based on DNS | |
US9491165B2 (en) | Providing a service based on time and location based passwords | |
US10003975B2 (en) | Authorized areas of authentication | |
CN102571859A (en) | System and method for controlling robot through cloud computation | |
US9516504B2 (en) | Intelligent role based access control based on trustee approvals | |
US20240121086A1 (en) | Security key for geographical locations | |
US20140229603A1 (en) | Validation of service management requests of a mobile device in a geographically bounded space | |
CN103366255A (en) | Innovative social management intelligent network platform | |
CN105100034A (en) | Method and apparatus for an access function in network applications | |
CN103514552A (en) | System and method for performing shopping through cloud computing and mobile device | |
US11651637B2 (en) | Method, system and apparatus for equipment monitoring and access control | |
Shivers et al. | Ride-hailing for autonomous vehicles: Hyperledger fabric-based secure and decentralize blockchain platform | |
CN106487770B (en) | Method for authenticating and authentication device | |
CN103593591B (en) | A kind of user profile access control method based on RBAC access control model | |
CN103505840A (en) | System and method for fire protection inspection through cloud computing and mobile device | |
KR101059058B1 (en) | Apparatus, method and system for service access control based on user location | |
CN103152319A (en) | Cloud maintenance, and method and system for authorization | |
CN103049707A (en) | Android platform based GPS (global positioning system) data intercepting control method | |
KR20200007349A (en) | Method for managing wireless network based on block chain and the system thereof | |
JP7254822B2 (en) | Systems, methods, and apparatus for provisioning and processing geolocation information for computerized devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120711 |