CN105577677A - Remote login method and system based on J2EE - Google Patents
Remote login method and system based on J2EE Download PDFInfo
- Publication number
- CN105577677A CN105577677A CN201511032402.0A CN201511032402A CN105577677A CN 105577677 A CN105577677 A CN 105577677A CN 201511032402 A CN201511032402 A CN 201511032402A CN 105577677 A CN105577677 A CN 105577677A
- Authority
- CN
- China
- Prior art keywords
- message
- client
- log
- database
- remote server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides a remote login method based on J2EE. The method comprises the steps of maintaining resource information of all mainframe devices, network devices and security devices in a system management range; storing the login information of a client into a database, and maintaining the user information in the login information; acquiring the login information from the database, and sending the login information to a filling assembly, wherein the login information at least comprises the IP address and port of a remote server, and the account information and password information of the client; entering the login interface of the client by the filling assembly according to the login information, inputting the account information and the password information on the login interface of the client by the filling assembly to log in the remote server, wherein the filling assembly is applicable to various clients with various operation systems.
Description
Technical field
The application relates to remote control technology field, especially, relates to a kind of remote entry method based on J2EE and system.
Background technology
Java 2 Platform Enterprise Edition (Java2PlatformEnterpriseEdition, be called for short J2EE), the various components comprised in J2EE and service architecture, all have common standard and specification, allow between the various different platform following J2EE framework, there is good compatibility.The application system that enterprise adopts is webpage (being called for short Web) application mainly, the exploitation of Web application mainly adopts J2EE technical system and standard card cage, the information products that J2EE enterprise backend of solving over uses each other cannot be compatible, and enterprises or outside are difficult to the awkward situation of intercommunication.
Along with the development of the network information technology, the further lifting of the construction requirements of enterprises system, miscellaneous service system constantly increases, network size and number of devices expand rapidly, increasingly sophisticated IT system and the operation maintenance personnel of different background bring very large risk to information system security: resource apparatus is built separately, each host resource, the network equipment, safety means, security component has a set of independently Account Administration system, Account Administration needs administrative staff to carry out by hand, very complicated, easily make mistakes, and be difficult to after makeing mistakes carry out Liability Retroact, cause potential safety hazard.
Summary of the invention
The application provides a kind of remote entry method based on J2EE and system, for solving the password not safety problem such as easy care, easy leakage existed in the internal enterprise resources Password Management of prior art.
A kind of remote entry method based on J2EE disclosed in the present application, described method comprises: the resource information safeguarding the All hosts equipment in described system management range, the network equipment, safety means; The log-on message of client is stored in database, and safeguards the user profile in described log-on message; From described database, obtain described log-on message, described log-on message sent to generation to fill out assembly, wherein, described log-on message at least comprises: the IP address of described remote server and port, and the account information of client and encrypted message; In described generation, fills out assembly enters into described client login interface according to described log-on message, the login interface of described client inputs described account information and described encrypted message logs in described remote server, wherein, in described generation, fills out the multiple client that assembly is applicable to several operation systems.
Alternatively, the encrypted message in the described log-on message obtained from described database be encryption, described from database, obtain the log-on message of client after, also comprise: decipher described encrypted message.
Alternatively, described method also comprises: determine that whether the described encrypted message be stored in the described log-on message in described database is consistent with the actual encrypted message of the described client in described remote server; If inconsistent, highlighted display is stored in the described log-on message in described database; Conforming amendment is carried out to inconsistent log-on message.
Alternatively, described method also comprises: carry out periodic retouching operation to the described actual encrypted message of the described client in described remote server.
Alternatively, described method also comprises: the mandate relation managing described user profile and described resource information; According to the mandate relation of remote server, quiescing is arranged to the instrument in described client; The clicking operation of user in described client is monitored, and display monitoring data.
A kind of remote entry system based on J2EE disclosed in the present application, described system comprises: resource management module, for safeguarding the resource information of All hosts equipment in described system management range, the network equipment, safety means; Identity management module, for the log-on message of client being stored in database, and safeguards the user profile in described log-on message; Acquisition module, for obtaining the log-on message of client from database, generation described log-on message is sent to fill out assembly, wherein, described log-on message at least comprises: the IP address of described remote server and port, and the account information of client and encrypted message; In described generation, fills out assembly, for entering into the login interface of described client according to the described log-on message obtained in described acquisition module, the login interface of described client inputs account information and described encrypted message described in described acquisition module and logs in described remote server, wherein, in described generation, fills out the multiple client that assembly is applicable in several operation systems.
Alternatively, the encrypted message in the described log-on message obtained from described database is encryption, and described system also comprises: deciphering module, for deciphering described encrypted message.
Whether alternatively, described system also comprises: determination module, consistent with the actual encrypted message of the described client in described remote server for determining the described encrypted message be stored in the described log-on message in described database; Display module, if for inconsistent, highlighted display is stored in the described log-on message in described database; Password modified module, for carrying out conforming amendment to inconsistent log-on message.
Alternatively, described system also comprises: cycle modified module, for carrying out periodic retouching operation to the described actual encrypted message of the described client in described remote server.
Alternatively, described system also comprises: entitlement management module, for managing the mandate relation of described user profile and described resource information; Authority management module, for the mandate relation according to remote server, arranges quiescing to the instrument in described client; Monitoring module, for monitoring the clicking operation of user in described client, and display monitoring data.
Compared with prior art, the application has the following advantages:
By the application based on the remote entry method of J2EE and system, can by enterprises host resource, the network equipment, the administrative power of the password of the resources such as safety means effectively controls in enterprises, a many people of password is avoided to use, enforcement personnel are late for the password kidnapping that transfer password causes, password amendment is complete in conscious, easily cause misoperation and not easily review the drawback of traditional O&M modes such as responsibility, simultaneously for the operation maintenance personnel under different background provides the single-sign-on function just can enter into target resource without the need to inputting password, operation maintenance personnel is subject to system " monitoring " in O&M process, the restriction of functions such as " interceptions ", O&M operation obtains standardization.
Accompanying drawing explanation
Fig. 1 is the flow chart of the application based on remote entry method one embodiment of J2EE;
Fig. 2 is the structural representation of the application based on remote entry system one embodiment of J2EE.
Embodiment
For enabling above-mentioned purpose, the feature and advantage of the application more become apparent, below in conjunction with the drawings and specific embodiments, the application is described in further detail.
In the description of the application, it will be appreciated that, orientation or the position relationship of the instruction such as term " centre ", " top ", " end ", " interior ", " outward " are based on orientation shown in the drawings or position relationship, only the application and simplified characterization for convenience of description, instead of instruction or hint indication device or element must have specific orientation, with specific azimuth configuration and operation, therefore can not be interpreted as the restriction to the application.Term " first ", " second " only for describing object, and can not be interpreted as instruction or hint relative importance or imply the quantity indicating indicated technical characteristic.Thus, be limited with " first ", the feature of " second " can express or impliedly comprise one or more these features.In the description of the application, the implication of " multiple " is two or more, unless otherwise expressly limited specifically.
The remote entry method based on J2EE that the embodiment of the present application provides, can provide support for remote control technology, is applied to the resource Password Management in enterprise.When client logs remote server, without the need to manually inputting account information and encrypted message, get final product Successful login server; Each account information and encrypted message etc. in client unified management remote server.Solve the problem of enterprise customer's account management dispersion, effectively the account information of the client of unified management enterprise customer, encrypted message and authority.
With reference to Fig. 1, show the flow chart of the application one embodiment based on the remote entry method of J2EE, the method comprises the following steps:
The resource information of step 101, the All hosts equipment safeguarded in described system management range, the network equipment, safety means.
The executive agent of this embodiment can be the remote entry system based on J2EE, such as, and ERM password management system.
Step 102, the log-on message of client to be stored in database, and to safeguard the user profile in described log-on message.
Can resource log-on message be safeguarded with the form of CS/BS system or file stored among lasting medium, as in database in this method.
Described user profile comprises account information and the encrypted message of client.
Step 103, from described database, obtain described log-on message, described log-on message sent to generation to fill out assembly, wherein, described log-on message at least comprises: the IP address of described remote server and port, and the account information of client and encrypted message.
The log-on message of the client obtained from database sends to generation to fill out assembly by this system, and wherein, above-mentioned log-on message at least comprises: the IP address of above-mentioned remote server and port, and the account information of client and encrypted message.As aforementioned, the log-on message of remote server at least comprises: the IP address 192.168.1.100 of remote server and port ftp:21, and the account information 999867 of client and encrypted message abcd1234.
In ERM password management system, in generation, fills out concrete finger " automation of login process " or " manually-operated automation ".It is a most important ring in single-sign-on function that generation fills out, along with the development of business, in generation, fills out the function of assembly also in continuous expansion, and " automatically logging in " is only limitted to the short time before login to the manipulation of client, operate based on " automatically inputting ", the original function of client software can not be changed.
In step 104, generation, fill out assembly enters into described client login interface according to described log-on message, the login interface of described client inputs described account information and described encrypted message logs in described remote server, wherein, in described generation, fills out the multiple client that assembly is applicable to several operation systems.
In described generation, fills out the multiple client in assembly support several operation systems, and generation fills out assembly and supports several operation systems, so can be connected with the remote server of several operation systems, and can for the account of the multiple client of filling out in several operation systems and password.In generation in this system, fills out assembly and is connected with remote server with above-mentioned port according to above-mentioned IP address, and enter into the interface of above-mentioned remote server, client is opened in this locality, there will be the login interface of client after opening, this login interface inputs above-mentioned account information and above-mentioned encrypted message logs in above-mentioned remote server.As aforementioned, IP address 192.168.1.100 according to remote server is connected with remote server with port ftp:21, after remote access client is opened in this locality, there will be the login interface of remote access client, this login interface inputs account information 999867 and the encrypted message abcd1234 of client, this remote server can be logged in.
Here login is single-sign-on (SingleSignOn, be called for short SSO), SSO is in multiple system resource, application system or client, and user only needs to log in multiple system resources, application system or the client that once just can access all mutual trusts.It comprises and login main specifically can be mapped to the mechanism being used for the login of same user in other clients, is one of solution of business event integration relatively more conventional at present.
Alternatively, the encrypted message in the described log-on message obtained from described database be encryption, described from database, obtain the log-on message of client after, also comprise: decipher described encrypted message.
Encrypted message in the above-mentioned log-on message that client obtains from above-mentioned database is encryption, is sightless, not with expressly representing, obtain the log-on message of client from database after, deciphers the word that above-mentioned encrypted message becomes expressly display.Encrypted message as aforementioned encryption is " * * * * * * * * ", and the encrypted message after deciphering is " abcd1234 ".
Wherein, enciphering and deciphering algorithm can adopt triple DEA (TripleDataEncryptionAlgorithm is called for short 3DES), and 3DES algorithm is used for encrypted primary account number and resource stores after account number cipher.3DES algorithm is using 8 plaintexts and ten keys as input, produces 8 grouping ciphertexts and exports.Its decipherment algorithm same double secret key 8 ciphertext block produce original clear packets.
Alternatively, said method also comprises: determine that whether the described encrypted message be stored in the described log-on message in described database is consistent with the actual encrypted message of the described client in described remote server; If inconsistent, highlighted display is stored in the described log-on message in described database; Conforming amendment is carried out to inconsistent log-on message.
Whether client determines the above-mentioned encrypted message " abcd1234 " be stored in the above-mentioned log-on message in above-mentioned database, consistent with the actual encrypted message of the above-mentioned client in above-mentioned remote server.Suppose that the actual encrypted message of client is for " abcd5678 ", the actual encrypted message being then stored in the above-mentioned encrypted message in the above-mentioned log-on message in above-mentioned database and the above-mentioned client in above-mentioned remote server is inconsistent, and then highlighted display is stored in the above-mentioned log-on message in above-mentioned database.
When the encrypted message in log-on message does not mate with account information, cannot normal single sign-on client-side.So provide password to verify function, password verifies function in units of client resource, judge that whether the above-mentioned encrypted message be stored in the above-mentioned log-on message in above-mentioned database is consistent with the actual encrypted message of the above-mentioned client in above-mentioned remote server, provide as inconsistent password modify feature to keep data consistent.
Alternatively, said method also comprises: carry out periodic retouching operation to the described actual encrypted message of the described client in described remote server.
In order to the fail safe of account, periodic retouching operation is carried out to the above-mentioned actual encrypted message of the above-mentioned client in above-mentioned remote server.As every three months is revised once.Password can arrange authority for being formed by numeral, symbol or monogram, and also can arrange the length range of password, such as, the length of password is not less than 8, carries out periodic retouching operation according to this authority to password.
For in each large enterprise and industry, the periodicity of password is revised, it can be the subsystem execution of ERM password management system, first the plan target of Modify password is set up, these tasks can be regularly perform or periodically perform, subsystem plan provides the functions such as establishment, deletion, startup, stopping, Query Result for ERM password management system, this system can be disposed independent of ERM password management system, uses independently database table.Wherein subsystem adopts mode adapter, and the different task of foundation is gone to perform by different adapters.
Alternatively, said method also comprises: the mandate relation managing described user profile and described resource information; According to the mandate relation of remote server, quiescing is arranged to the instrument in described client; The clicking operation of user in described client is monitored, and display monitoring data.
Authorization privilege can be disable access address list, forbid sending designated order etc., as aforementioned, according to the authorization privilege of above-mentioned remote server, the instrument in above-mentioned client is arranged to the operation of disable access address list; Monitoring is carried out to the clicking operation of user in above-mentioned client and browses trace, and display monitoring data.
The Telnet step based on J2EE of foregoing description can provide support for the resource password management system of enterprise, the resource password management system of enterprise is shown by web interface, system is divided into gate system and background system by web interface, wherein gate system be integrated with single-sign-on and generation fill out wait functional realiey resource one key log in, solve enterprise customer's account management lack problem; Background system is using described identity management module and described resource management module as system basic service and data supporting, and the functions such as plan, password is verified, system data is synchronous with resource information are integrated with to resource password, thus solve resource apparatus in enterprise information management and build separately, lack unified planning and more cannot form effective unified management, omit account, omit authority and right assignment problem improperly.
Therefore, by the application based on the remote entry method of J2EE and system, can realize using all client logs to each remote server in enterprise fast, filling out assembly by generation just can the multiple client of disposable login without the need to manually inputting password, monitors all clients of each remote server.
For aforesaid each embodiment of the method, simple in order to describe, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the application is not by the restriction of described sequence of movement, because according to the application, some step can adopt other orders or perform simultaneously; Secondly, those skilled in the art also should know, said method embodiment all belongs to preferred embodiment, and involved action and module might not be that the application is necessary.
Corresponding with the above-mentioned remote entry method embodiment based on J2EE, the embodiment of the present application additionally provides a kind of remote entry system based on J2EE, remote entry system schematic diagram based on J2EE shown in Figure 2, this system specifically can comprise: resource management module 201, identity management module 202, acquisition module 203 and generation fill out assembly 204.
Resource management module 201, for safeguarding the resource information of All hosts equipment in described system management range, the network equipment, safety means.Identity management module 202, for the log-on message of client being stored in database, and safeguards the user profile in described log-on message; Described user profile comprises account information and the encrypted message of client.Acquisition module 203, for obtaining the log-on message of client from database, generation described log-on message is sent to fill out assembly, wherein, described log-on message at least comprises: the IP address of described remote server and port, and the account information of client and encrypted message.In described generation, fills out assembly 204, for entering into the login interface of described client according to the described log-on message obtained in described acquisition module, the login interface of described client inputs account information and described encrypted message described in described acquisition module and logs in described remote server, wherein, in described generation, fills out the multiple client that assembly is applicable in several operation systems.
Wherein, the encrypted message in the above-mentioned log-on message obtained from above-mentioned database is encryption, and said system can also comprise:
Deciphering module 205, for deciphering above-mentioned encrypted message.
Said system also comprises:
Determination module 206, whether consistent with the actual encrypted message of the described client in described remote server for determining the described encrypted message be stored in the described log-on message in described database; Display module 207, if for inconsistent, highlighted display is stored in the described log-on message in described database; Password modified module 208, for carrying out conforming amendment to inconsistent log-on message.
Said system also comprises:
Cycle modified module 209, for carrying out periodic retouching operation to the above-mentioned actual encrypted message of the above-mentioned client in above-mentioned remote server.
Said system also comprises:
Entitlement management module 210, for managing the mandate relation of described user profile and described resource information; Authority management module 211, for the mandate relation according to remote server, arranges quiescing to the instrument in described client; Monitoring module 212, for monitoring the clicking operation of user in described client, and display monitoring data.
The above-mentioned remote entry system embodiment based on J2EE is corresponding with the above-mentioned remote entry method embodiment based on J2EE, each unit in said system performs each step in said method, implement, therefore, the relevant details that realizes see the introduction in embodiment of the method, can not repeat them here.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.Especially, for system or system embodiment, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.System described above and system embodiment are only schematic, wherein the above-mentioned unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
There is provided the application above, be described in detail, apply specific case herein and set forth the principle of the application and execution mode, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications.To sum up above-mentioned, this description should not be construed as the restriction to the application.
Claims (10)
1. based on a remote entry method of J2EE, it is characterized in that, described method comprises:
Safeguard the resource information of the All hosts equipment in described system management range, the network equipment, safety means;
The log-on message of client is stored in database, and safeguards the user profile in described log-on message;
From described database, obtain described log-on message, described log-on message sent to generation to fill out assembly, wherein, described log-on message at least comprises: the IP address of described remote server and port, and the account information of client and encrypted message;
In described generation, fills out assembly enters into described client login interface according to described log-on message, the login interface of described client inputs described account information and described encrypted message logs in described remote server, wherein, in described generation, fills out the multiple client that assembly is applicable to several operation systems.
2. method according to claim 1, is characterized in that, the encrypted message in the described log-on message obtained from described database be encryption, described from database, obtain the log-on message of client after, also comprise: decipher described encrypted message.
3. method according to claim 1 and 2, is characterized in that, described method also comprises:
Determine that whether the described encrypted message be stored in the described log-on message in described database is consistent with the actual encrypted message of the described client in described remote server;
If inconsistent, highlighted display is stored in the described log-on message in described database;
Conforming amendment is carried out to inconsistent log-on message.
4. method according to claim 3, is characterized in that, described method also comprises:
Periodic retouching operation is carried out to the described actual encrypted message of the described client in described remote server.
5. method according to claim 1, is characterized in that, described method also comprises:
Manage the mandate relation of described user profile and described resource information;
According to the mandate relation of remote server, quiescing is arranged to the instrument in described client;
The clicking operation of user in described client is monitored, and display monitoring data.
6. based on a remote entry system of J2EE, it is characterized in that, described system comprises:
Resource management module, for safeguarding the resource information of All hosts equipment in described system management range, the network equipment, safety means;
Identity management module, for the log-on message of client being stored in database, and safeguards the user profile in described log-on message;
Acquisition module, for obtaining the log-on message of client from database, generation described log-on message is sent to fill out assembly, wherein, described log-on message at least comprises: the IP address of described remote server and port, and the account information of client and encrypted message;
In described generation, fills out assembly, for entering into the login interface of described client according to the described log-on message obtained in described acquisition module, the login interface of described client inputs account information and described encrypted message described in described acquisition module and logs in described remote server, wherein, in described generation, fills out the multiple client that assembly is applicable in several operation systems.
7. system according to claim 6, is characterized in that, the encrypted message in the described log-on message obtained from described database is encryption, and described system also comprises:
Deciphering module, for deciphering described encrypted message.
8. the system according to claim 6 or 7, is characterized in that, described system also comprises:
Determination module, whether consistent with the actual encrypted message of the described client in described remote server for determining the described encrypted message be stored in the described log-on message in described database;
Display module, if for inconsistent, highlighted display is stored in the described log-on message in described database;
Password modified module, for carrying out conforming amendment to inconsistent log-on message.
9. system according to claim 8, is characterized in that, described system also comprises:
Cycle modified module, for carrying out periodic retouching operation to the described actual encrypted message of the described client in described remote server.
10. system according to claim 6, is characterized in that, described system also comprises:
Entitlement management module, for managing the mandate relation of described user profile and described resource information;
Authority management module, for the mandate relation according to remote server, arranges quiescing to the instrument in described client;
Monitoring module, for monitoring the clicking operation of user in described client, and display monitoring data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511032402.0A CN105577677A (en) | 2015-12-31 | 2015-12-31 | Remote login method and system based on J2EE |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511032402.0A CN105577677A (en) | 2015-12-31 | 2015-12-31 | Remote login method and system based on J2EE |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105577677A true CN105577677A (en) | 2016-05-11 |
Family
ID=55887334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511032402.0A Pending CN105577677A (en) | 2015-12-31 | 2015-12-31 | Remote login method and system based on J2EE |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105577677A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106506227A (en) * | 2016-11-29 | 2017-03-15 | 深圳天珑无线科技有限公司 | Config update method and config update device |
CN106909826A (en) * | 2017-02-23 | 2017-06-30 | 北京天融信网络安全技术有限公司 | Password is for action and system |
CN107018153A (en) * | 2017-05-27 | 2017-08-04 | 上海爱优威软件开发有限公司 | A kind of safe login method |
CN110035088A (en) * | 2019-04-26 | 2019-07-19 | 厦门商集网络科技有限责任公司 | Method and apparatus based on RPA remote control operation system automated log on |
CN111405006A (en) * | 2020-03-06 | 2020-07-10 | 北京奇艺世纪科技有限公司 | Method and device for processing remote login failure and remote login system |
CN111526150A (en) * | 2020-04-28 | 2020-08-11 | 吴飞 | Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port |
CN112131590A (en) * | 2020-09-28 | 2020-12-25 | 平安国际智慧城市科技股份有限公司 | Database connection establishing method and device, computer equipment and storage medium |
CN112667344A (en) * | 2021-01-20 | 2021-04-16 | 广州锦行网络科技有限公司 | Hosting device and method |
CN112711456A (en) * | 2020-12-31 | 2021-04-27 | 北京珞安科技有限责任公司 | Agent login method and device of operation and maintenance tool and computer equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7136896B1 (en) * | 2000-09-26 | 2006-11-14 | Juniper Networks, Inc. | Dynamic toolbar for markup language document |
CN2891503Y (en) * | 2006-04-26 | 2007-04-18 | 北京华科广通信息技术有限公司 | Security protection system for information system or equipment |
CN101217368A (en) * | 2007-12-29 | 2008-07-09 | 亿阳安全技术有限公司 | A network logging on system and the corresponding configuration method and methods for logging on the application system |
CN104702575A (en) * | 2013-12-06 | 2015-06-10 | 中国移动通信集团山东有限公司 | Account management method, management platform and account management system |
-
2015
- 2015-12-31 CN CN201511032402.0A patent/CN105577677A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7136896B1 (en) * | 2000-09-26 | 2006-11-14 | Juniper Networks, Inc. | Dynamic toolbar for markup language document |
CN2891503Y (en) * | 2006-04-26 | 2007-04-18 | 北京华科广通信息技术有限公司 | Security protection system for information system or equipment |
CN101217368A (en) * | 2007-12-29 | 2008-07-09 | 亿阳安全技术有限公司 | A network logging on system and the corresponding configuration method and methods for logging on the application system |
CN104702575A (en) * | 2013-12-06 | 2015-06-10 | 中国移动通信集团山东有限公司 | Account management method, management platform and account management system |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106506227A (en) * | 2016-11-29 | 2017-03-15 | 深圳天珑无线科技有限公司 | Config update method and config update device |
CN106909826A (en) * | 2017-02-23 | 2017-06-30 | 北京天融信网络安全技术有限公司 | Password is for action and system |
CN106909826B (en) * | 2017-02-23 | 2019-12-27 | 北京天融信网络安全技术有限公司 | Password substitution device and system |
CN107018153A (en) * | 2017-05-27 | 2017-08-04 | 上海爱优威软件开发有限公司 | A kind of safe login method |
CN110035088B (en) * | 2019-04-26 | 2021-08-24 | 厦门商集网络科技有限责任公司 | Method and equipment for automatically logging in remote control operating system based on RPA |
CN110035088A (en) * | 2019-04-26 | 2019-07-19 | 厦门商集网络科技有限责任公司 | Method and apparatus based on RPA remote control operation system automated log on |
CN111405006A (en) * | 2020-03-06 | 2020-07-10 | 北京奇艺世纪科技有限公司 | Method and device for processing remote login failure and remote login system |
CN111405006B (en) * | 2020-03-06 | 2022-07-12 | 北京奇艺世纪科技有限公司 | Method and device for processing remote login failure and remote login system |
CN111526150A (en) * | 2020-04-28 | 2020-08-11 | 吴飞 | Zero-trust automation rule releasing platform and releasing method for single-cluster or multi-cluster cloud computer remote operation and maintenance port |
CN112131590A (en) * | 2020-09-28 | 2020-12-25 | 平安国际智慧城市科技股份有限公司 | Database connection establishing method and device, computer equipment and storage medium |
CN112711456A (en) * | 2020-12-31 | 2021-04-27 | 北京珞安科技有限责任公司 | Agent login method and device of operation and maintenance tool and computer equipment |
CN112711456B (en) * | 2020-12-31 | 2024-08-06 | 北京珞安科技有限责任公司 | Proxy login method and device of operation and maintenance tool and computer equipment |
CN112667344A (en) * | 2021-01-20 | 2021-04-16 | 广州锦行网络科技有限公司 | Hosting device and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105577677A (en) | Remote login method and system based on J2EE | |
CN110543464B (en) | Big data platform applied to intelligent park and operation method | |
CN106411857B (en) | A kind of private clound GIS service access control method based on virtual isolation mech isolation test | |
CN105378744B (en) | User and device authentication in business system | |
CN103237019B (en) | A kind of cloud service accesses gateway system and method | |
US9172544B2 (en) | Systems and methods for authentication between networked devices | |
US8989386B2 (en) | Method and device for providing at least one secure cryptographic key | |
US20120254622A1 (en) | Secure Access to Electronic Devices | |
US9009469B2 (en) | Systems and methods for securing data in a cloud computing environment using in-memory techniques and secret key encryption | |
CN106357724A (en) | Uniformly integrated information management platform system | |
CN101410803A (en) | Methods and systems for providing access to a computing environment | |
CN106302606B (en) | Across the application access method and device of one kind | |
CN108259422A (en) | A kind of multi-tenant access control method and device | |
US11947710B2 (en) | Real-time feature level software security | |
CN102945337A (en) | On-line self-help management method and system of Subversion user password | |
CN108319857A (en) | Trusted application adds unlocking method and system | |
CN104580081A (en) | Integrated SSO (single sign on) system | |
US20190273609A1 (en) | Mutually authenticated adaptive management interfaces for interaction with sensitive infrastructure | |
WO2012176506A1 (en) | Single sign-on system, single sign-on method, and authentication server linking program | |
CN109450925B (en) | User authority verification method and device for operation and maintenance of power secondary system and electronic equipment | |
CN101118639A (en) | Safety electric national census system | |
Bo et al. | Usable security mechanisms in smart building | |
CN114422182B (en) | Unified identity management platform | |
CN113987561A (en) | Trusted execution environment-based private data classification method, system and terminal | |
CN117997656B (en) | Industrial control data full life cycle safety control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160511 |
|
WD01 | Invention patent application deemed withdrawn after publication |