CN103973689A - Method for managing clusters through mobile device - Google Patents
Method for managing clusters through mobile device Download PDFInfo
- Publication number
- CN103973689A CN103973689A CN201410196264.9A CN201410196264A CN103973689A CN 103973689 A CN103973689 A CN 103973689A CN 201410196264 A CN201410196264 A CN 201410196264A CN 103973689 A CN103973689 A CN 103973689A
- Authority
- CN
- China
- Prior art keywords
- user
- access
- mobile device
- enterprise
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention provides a method for managing clusters through a mobile device, and belongs to the field of cluster managing methods. The method defines two modes of the mobile device, namely the individual mode and enterprise mode. When the individual mode is switched to the enterprise mode, through authentication and access control strategies, the clusters can be managed, and safety is guaranteed.
Description
technical field
The present invention relates to a kind of cluster management method, the specifically a kind of method of mobile device to cluster management that use, propose to two kinds of patterns of mobile device definition: individual pattern and enterprise model, in the time being switched to enterprise model from individual pattern, through checking and access control policy, can management cluster, ensure fail safe.
Background technology
Clustering is a kind of newer technology, by Clustering, can in the situation that paying lower cost, obtain the relatively high income aspect performance, reliability, flexibility.
And mobile device, being also referred to as running gear (English: Mobile device), flow device, hand-held device (handheld device) etc., is a kind of computing equipment of pocket size, conventionally has a little display screens, touch-control input, or small-sized keyboard.Because can be accessed whenever and wherever possible and be obtained various information by it, this kind equipment catches on very soon.With such as laptop computer with together with mobile computing device smart mobile phone.This kind equipment has represented new calculating field, in people's life and work, plays a significant role.
At work, people more and more bring into use mobile device, and these mobile devices often belong to person ownership.This just involves cluster problem of data safety.How carry out safe access cluster device with personal device, this just becomes a problem in the urgent need to address.
Summary of the invention
Carry out a method for management cluster with mobile device, the present invention designs a kind of by the design implementation method of changing between individual pattern and enterprise model.Being transformed into enterprise model from individual pattern, first user is authenticated, then carry out corresponding access strategy, thereby controlling the access cluster of user security.This method for designing is achieved as follows:
(1), in this method for designing, have two important steps:
A, certification: when user is switched to enterprise model, need to send a certification to server, with clear and definite user's identity.
B, access control policy: keeper generates strategy, user can not change it.Policy definition which main body can access which object.
In user authentication process, server can return to an identity ID to user, and this ID shows that user can visit cluster with legal identity, is then formulating an access strategy for this ID.
(2) design philosophy of this method is: in the time that a user will access cluster from mobile device, first to be switched to enterprise model from individual pattern, at this moment, to send a message certification from mobile device to enterprise servers, show the legitimacy of user identity, enterprise servers, after checking, are given legal ID of active user, and formulate an access strategy.The all access of user is all based on strategy like this, anyly all can not do not carried out by the operation of explicit mandate.Policy control is developed and realizes paying attention to most in secret system.Main body obtains clearly mark, and object obtains key words sorting, or claims level of security.By the pressure access control at inner nuclear layer, can control between those application and can mutually access, those application can be accessed those data, realize the isolation of individual territory and enterprise domain.
Of the present invention produced beneficial effect is:
Propose to two kinds of patterns of mobile device definition: individual pattern and enterprise model, in the time being switched to enterprise model from individual pattern, through checking and access control policy, can management cluster, ensure fail safe.。
Brief description of the drawings
Accompanying drawing 1 is normal election flow process of the present invention.
Embodiment
With reference to the accompanying drawings, content of the present invention is described to the implementation procedure that realizes this method for designing with an instantiation.
(1) user user will access enterprise clusters.
(2) user starts the conversion of individual pattern to enterprise model on individual mobile terminal.
(3) user sends a message to enterprise servers, authenticates, and server returns to an ack message, confirms the legitimacy of user identity, and formulates user's access control policy.
(4) user receives message, is transformed into enterprise model.
User is by individual mobile device management cluster.
Claims (1)
1. use the method for mobile device to cluster management, it is characterized in that this method for designing is achieved as follows:
(1), in this method for designing, have two important steps:
A, certification: when user is switched to enterprise model, need to send a certification to server, with clear and definite user's identity;
B, access control policy: keeper generates strategy, user can not change it; Policy definition which main body can access which object;
In user authentication process, server can return to an identity ID to user, and this ID shows that user can visit cluster with legal identity, is then formulating an access strategy for this ID;
(2) in the time that a user will access cluster from mobile device, first to be switched to enterprise model from individual pattern, at this moment, to send a message certification from mobile device to enterprise servers, show the legitimacy of user identity, enterprise servers, after checking, are given legal ID of active user, and formulate an access strategy; The all access of user is all based on strategy like this, anyly all can not do not carried out by the operation of explicit mandate; Policy control is developed and realizes paying attention to most in secret system; Main body obtains clearly mark, and object obtains key words sorting, or claims level of security; By the pressure access control at inner nuclear layer, can control between those application and can mutually access, those application can be accessed those data, realize the isolation of individual territory and enterprise domain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410196264.9A CN103973689A (en) | 2014-05-12 | 2014-05-12 | Method for managing clusters through mobile device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410196264.9A CN103973689A (en) | 2014-05-12 | 2014-05-12 | Method for managing clusters through mobile device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103973689A true CN103973689A (en) | 2014-08-06 |
Family
ID=51242735
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410196264.9A Pending CN103973689A (en) | 2014-05-12 | 2014-05-12 | Method for managing clusters through mobile device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103973689A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357455A (en) * | 2016-10-11 | 2017-01-25 | 北京元心科技有限公司 | Method and system for controlling application access network |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247336A (en) * | 2008-03-07 | 2008-08-20 | 中兴通讯股份有限公司 | Method and server for controlling multilevel access authority of access user |
CN201690475U (en) * | 2010-05-13 | 2010-12-29 | 中国工商银行股份有限公司 | Application server access system in enterprise local area network |
CN102457555A (en) * | 2010-10-28 | 2012-05-16 | 中兴通讯股份有限公司 | Security system and method for distributed storage |
CN103561033A (en) * | 2013-11-08 | 2014-02-05 | 西安电子科技大学宁波信息技术研究院 | Device and method for user to have remote access to HDFS cluster |
CN103906042A (en) * | 2012-12-28 | 2014-07-02 | 中国电信股份有限公司 | Mobile application space realization method and system and server |
CN104219077A (en) * | 2013-06-04 | 2014-12-17 | 成都睿恒科技有限公司 | Information management system for middle and small-sized enterprises |
-
2014
- 2014-05-12 CN CN201410196264.9A patent/CN103973689A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247336A (en) * | 2008-03-07 | 2008-08-20 | 中兴通讯股份有限公司 | Method and server for controlling multilevel access authority of access user |
CN201690475U (en) * | 2010-05-13 | 2010-12-29 | 中国工商银行股份有限公司 | Application server access system in enterprise local area network |
CN102457555A (en) * | 2010-10-28 | 2012-05-16 | 中兴通讯股份有限公司 | Security system and method for distributed storage |
CN103906042A (en) * | 2012-12-28 | 2014-07-02 | 中国电信股份有限公司 | Mobile application space realization method and system and server |
CN104219077A (en) * | 2013-06-04 | 2014-12-17 | 成都睿恒科技有限公司 | Information management system for middle and small-sized enterprises |
CN103561033A (en) * | 2013-11-08 | 2014-02-05 | 西安电子科技大学宁波信息技术研究院 | Device and method for user to have remote access to HDFS cluster |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357455A (en) * | 2016-10-11 | 2017-01-25 | 北京元心科技有限公司 | Method and system for controlling application access network |
CN106357455B (en) * | 2016-10-11 | 2019-10-25 | 北京元心科技有限公司 | A kind of method and system controlling application access network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11770368B2 (en) | Techniques for shared private data objects in a trusted execution environment | |
CN102685089B (en) | For method and the client devices of the credible equipment statement of enterprise's application | |
Shi et al. | Implicit authentication through learning user behavior | |
CN115335827B (en) | Method and apparatus for implementing role-based access control clustering machine learning model execution module | |
CN100452074C (en) | Copyright protection method and system for digital contents controlled by time | |
US9900261B2 (en) | Shared resource watermarking and management | |
CN106134154A (en) | The technology that the authentication token operation utilizing machine to generate services | |
WO2015142965A1 (en) | Techniques to provide network security through just-in-time provisioned accounts | |
CN107409129B (en) | Use the authorization in accesses control list and the distributed system of group | |
US9195813B2 (en) | Secure gesture | |
US20150066873A1 (en) | Policy based deduplication techniques | |
US20170149686A1 (en) | Resource watermarking and management | |
CN104346550A (en) | Information processing method and electronic equipment | |
CN104038509A (en) | Fingerprint authentication cloud system | |
CN105659247B (en) | The proactive Threat Management system of context-aware | |
CN104504308B (en) | A kind of license validation method for forbidding virtual machine to use software | |
CN103220166A (en) | License management method of server cluster | |
CN103973689A (en) | Method for managing clusters through mobile device | |
CN104157030A (en) | Method for controlling door lock through electronic network communication equipment | |
CN104318174A (en) | Document protecting method, document protecting devices and document protecting system | |
US11392935B2 (en) | Automatic activation of a physical payment card | |
CN104217292A (en) | Service platform system based on cloud computing | |
US11316864B2 (en) | Method and apparatus for ephemeral roles implementing module | |
CN105656942A (en) | Method for user identity authentication in authentication service cloud | |
CN103793643A (en) | Starting method and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140806 |
|
RJ01 | Rejection of invention patent application after publication |