CN103973689A - Method for managing clusters through mobile device - Google Patents

Method for managing clusters through mobile device Download PDF

Info

Publication number
CN103973689A
CN103973689A CN201410196264.9A CN201410196264A CN103973689A CN 103973689 A CN103973689 A CN 103973689A CN 201410196264 A CN201410196264 A CN 201410196264A CN 103973689 A CN103973689 A CN 103973689A
Authority
CN
China
Prior art keywords
user
access
mobile device
enterprise
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410196264.9A
Other languages
Chinese (zh)
Inventor
冯江辉
张在贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201410196264.9A priority Critical patent/CN103973689A/en
Publication of CN103973689A publication Critical patent/CN103973689A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a method for managing clusters through a mobile device, and belongs to the field of cluster managing methods. The method defines two modes of the mobile device, namely the individual mode and enterprise mode. When the individual mode is switched to the enterprise mode, through authentication and access control strategies, the clusters can be managed, and safety is guaranteed.

Description

A kind of method of mobile device to cluster management that use
technical field
The present invention relates to a kind of cluster management method, the specifically a kind of method of mobile device to cluster management that use, propose to two kinds of patterns of mobile device definition: individual pattern and enterprise model, in the time being switched to enterprise model from individual pattern, through checking and access control policy, can management cluster, ensure fail safe.
Background technology
Clustering is a kind of newer technology, by Clustering, can in the situation that paying lower cost, obtain the relatively high income aspect performance, reliability, flexibility.
And mobile device, being also referred to as running gear (English: Mobile device), flow device, hand-held device (handheld device) etc., is a kind of computing equipment of pocket size, conventionally has a little display screens, touch-control input, or small-sized keyboard.Because can be accessed whenever and wherever possible and be obtained various information by it, this kind equipment catches on very soon.With such as laptop computer with together with mobile computing device smart mobile phone.This kind equipment has represented new calculating field, in people's life and work, plays a significant role.
At work, people more and more bring into use mobile device, and these mobile devices often belong to person ownership.This just involves cluster problem of data safety.How carry out safe access cluster device with personal device, this just becomes a problem in the urgent need to address.
Summary of the invention
Carry out a method for management cluster with mobile device, the present invention designs a kind of by the design implementation method of changing between individual pattern and enterprise model.Being transformed into enterprise model from individual pattern, first user is authenticated, then carry out corresponding access strategy, thereby controlling the access cluster of user security.This method for designing is achieved as follows:
(1), in this method for designing, have two important steps:
A, certification: when user is switched to enterprise model, need to send a certification to server, with clear and definite user's identity.
B, access control policy: keeper generates strategy, user can not change it.Policy definition which main body can access which object.
In user authentication process, server can return to an identity ID to user, and this ID shows that user can visit cluster with legal identity, is then formulating an access strategy for this ID.
(2) design philosophy of this method is: in the time that a user will access cluster from mobile device, first to be switched to enterprise model from individual pattern, at this moment, to send a message certification from mobile device to enterprise servers, show the legitimacy of user identity, enterprise servers, after checking, are given legal ID of active user, and formulate an access strategy.The all access of user is all based on strategy like this, anyly all can not do not carried out by the operation of explicit mandate.Policy control is developed and realizes paying attention to most in secret system.Main body obtains clearly mark, and object obtains key words sorting, or claims level of security.By the pressure access control at inner nuclear layer, can control between those application and can mutually access, those application can be accessed those data, realize the isolation of individual territory and enterprise domain.
Of the present invention produced beneficial effect is:
Propose to two kinds of patterns of mobile device definition: individual pattern and enterprise model, in the time being switched to enterprise model from individual pattern, through checking and access control policy, can management cluster, ensure fail safe.。
Brief description of the drawings
Accompanying drawing 1 is normal election flow process of the present invention.
Embodiment
With reference to the accompanying drawings, content of the present invention is described to the implementation procedure that realizes this method for designing with an instantiation.
(1) user user will access enterprise clusters.
(2) user starts the conversion of individual pattern to enterprise model on individual mobile terminal.
(3) user sends a message to enterprise servers, authenticates, and server returns to an ack message, confirms the legitimacy of user identity, and formulates user's access control policy.
(4) user receives message, is transformed into enterprise model.
User is by individual mobile device management cluster.

Claims (1)

1. use the method for mobile device to cluster management, it is characterized in that this method for designing is achieved as follows:
(1), in this method for designing, have two important steps:
A, certification: when user is switched to enterprise model, need to send a certification to server, with clear and definite user's identity;
B, access control policy: keeper generates strategy, user can not change it; Policy definition which main body can access which object;
In user authentication process, server can return to an identity ID to user, and this ID shows that user can visit cluster with legal identity, is then formulating an access strategy for this ID;
(2) in the time that a user will access cluster from mobile device, first to be switched to enterprise model from individual pattern, at this moment, to send a message certification from mobile device to enterprise servers, show the legitimacy of user identity, enterprise servers, after checking, are given legal ID of active user, and formulate an access strategy; The all access of user is all based on strategy like this, anyly all can not do not carried out by the operation of explicit mandate; Policy control is developed and realizes paying attention to most in secret system; Main body obtains clearly mark, and object obtains key words sorting, or claims level of security; By the pressure access control at inner nuclear layer, can control between those application and can mutually access, those application can be accessed those data, realize the isolation of individual territory and enterprise domain.
CN201410196264.9A 2014-05-12 2014-05-12 Method for managing clusters through mobile device Pending CN103973689A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410196264.9A CN103973689A (en) 2014-05-12 2014-05-12 Method for managing clusters through mobile device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410196264.9A CN103973689A (en) 2014-05-12 2014-05-12 Method for managing clusters through mobile device

Publications (1)

Publication Number Publication Date
CN103973689A true CN103973689A (en) 2014-08-06

Family

ID=51242735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410196264.9A Pending CN103973689A (en) 2014-05-12 2014-05-12 Method for managing clusters through mobile device

Country Status (1)

Country Link
CN (1) CN103973689A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357455A (en) * 2016-10-11 2017-01-25 北京元心科技有限公司 Method and system for controlling application access network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247336A (en) * 2008-03-07 2008-08-20 中兴通讯股份有限公司 Method and server for controlling multilevel access authority of access user
CN201690475U (en) * 2010-05-13 2010-12-29 中国工商银行股份有限公司 Application server access system in enterprise local area network
CN102457555A (en) * 2010-10-28 2012-05-16 中兴通讯股份有限公司 Security system and method for distributed storage
CN103561033A (en) * 2013-11-08 2014-02-05 西安电子科技大学宁波信息技术研究院 Device and method for user to have remote access to HDFS cluster
CN103906042A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 Mobile application space realization method and system and server
CN104219077A (en) * 2013-06-04 2014-12-17 成都睿恒科技有限公司 Information management system for middle and small-sized enterprises

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247336A (en) * 2008-03-07 2008-08-20 中兴通讯股份有限公司 Method and server for controlling multilevel access authority of access user
CN201690475U (en) * 2010-05-13 2010-12-29 中国工商银行股份有限公司 Application server access system in enterprise local area network
CN102457555A (en) * 2010-10-28 2012-05-16 中兴通讯股份有限公司 Security system and method for distributed storage
CN103906042A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 Mobile application space realization method and system and server
CN104219077A (en) * 2013-06-04 2014-12-17 成都睿恒科技有限公司 Information management system for middle and small-sized enterprises
CN103561033A (en) * 2013-11-08 2014-02-05 西安电子科技大学宁波信息技术研究院 Device and method for user to have remote access to HDFS cluster

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357455A (en) * 2016-10-11 2017-01-25 北京元心科技有限公司 Method and system for controlling application access network
CN106357455B (en) * 2016-10-11 2019-10-25 北京元心科技有限公司 A kind of method and system controlling application access network

Similar Documents

Publication Publication Date Title
US11770368B2 (en) Techniques for shared private data objects in a trusted execution environment
CN102685089B (en) For method and the client devices of the credible equipment statement of enterprise's application
Shi et al. Implicit authentication through learning user behavior
CN115335827B (en) Method and apparatus for implementing role-based access control clustering machine learning model execution module
CN100452074C (en) Copyright protection method and system for digital contents controlled by time
US9900261B2 (en) Shared resource watermarking and management
CN106134154A (en) The technology that the authentication token operation utilizing machine to generate services
WO2015142965A1 (en) Techniques to provide network security through just-in-time provisioned accounts
CN107409129B (en) Use the authorization in accesses control list and the distributed system of group
US9195813B2 (en) Secure gesture
US20150066873A1 (en) Policy based deduplication techniques
US20170149686A1 (en) Resource watermarking and management
CN104346550A (en) Information processing method and electronic equipment
CN104038509A (en) Fingerprint authentication cloud system
CN105659247B (en) The proactive Threat Management system of context-aware
CN104504308B (en) A kind of license validation method for forbidding virtual machine to use software
CN103220166A (en) License management method of server cluster
CN103973689A (en) Method for managing clusters through mobile device
CN104157030A (en) Method for controlling door lock through electronic network communication equipment
CN104318174A (en) Document protecting method, document protecting devices and document protecting system
US11392935B2 (en) Automatic activation of a physical payment card
CN104217292A (en) Service platform system based on cloud computing
US11316864B2 (en) Method and apparatus for ephemeral roles implementing module
CN105656942A (en) Method for user identity authentication in authentication service cloud
CN103793643A (en) Starting method and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140806

RJ01 Rejection of invention patent application after publication