CN106506549A - The cloud of network equipment agency shares private permission management method and system - Google Patents

The cloud of network equipment agency shares private permission management method and system Download PDF

Info

Publication number
CN106506549A
CN106506549A CN201611227611.5A CN201611227611A CN106506549A CN 106506549 A CN106506549 A CN 106506549A CN 201611227611 A CN201611227611 A CN 201611227611A CN 106506549 A CN106506549 A CN 106506549A
Authority
CN
China
Prior art keywords
network equipment
cloud
user
catalogue
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611227611.5A
Other languages
Chinese (zh)
Inventor
张享达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201611227611.5A priority Critical patent/CN106506549A/en
Publication of CN106506549A publication Critical patent/CN106506549A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Abstract

The present invention relates to a kind of cloud of network equipment agency shares private permission management method and system.The inventive method step is as follows:A:Configuration modification is carried out to the legal terminal list of a local user by the network equipment;B:By the network equipment binding management user, the network equipment is pointed to when application software provides the shared interface of access cloud;C:By network equipment hijack legitimate local user and/or the access request of management user;D:The network equipment provides secure connection and decryption method, and acts on behalf of the access of the privacy catalogue in cloud share directory, allows legal local user and management user to access privacy catalogue and/or catalogue on the disclosure in cloud share directory.Advantage is:Realize in data transmission of internet of things or without home server and without multiple situations such as network equipment expansion card, can directly upload privacy and access catalogue have special safeguard protection effect.

Description

The cloud of network equipment agency shares private permission management method and system
Technical field
The invention belongs to cloud service technical field, shares private permission pipe more particularly, to the cloud that a kind of network equipment is acted on behalf of Reason method and system.
Background technology
Cloud service is increase, use and the delivery mode of the related service based on the Internet, is usually directed to by the Internet To provide dynamic easily extension and often virtualized resource.Cloud service refer to by network with demand, easy extension way obtain Required service.This service can be that IT is related with software, the Internet, may also be other services.It means computing capability Can be circulated by the Internet as a kind of commodity.In simple terms, cloud service can be needed for by enterprise software and hardware, data are all It is put on network, at any time and place, is interconnected using different information technoloy equipments, realize the purposes such as data access, computing, I.e. data center can provide cloud account and the communal space for the access device of network side, and such user's activation equipment simultaneously binds cloud After account, it is possible to access cloud shared data.
Currently, common cloud service has two kinds of public cloud and private clound, and wherein, public cloud cost is relatively low, and which is most basic Service, multiple clients can share the system resource of a service provider, and they needn't set up any equipment and be equipped with management Personnel, just can enjoy the IT services of specialty, and, for general entrepreneur, medium and small enterprise, undoubtedly a reduces cost is good for this Method.The operation form of private clound, similar with public cloud.However, it is but a significant investment to set up private clound, enterprise need to voluntarily Design data center, network, storage device, and have the advisory group of specialty.Enterprise management level must take into full account use The necessity of private clound, and whether have enough resources to guarantee private clound normal operation.But the net in due to cloud service The rights management of network file-sharing may relate to access of stealing secret information mainly by user's key once key is leaked or is cracked, this Larger threat is there is for user security.
In order to improve the problem of prior art presence, people have carried out long-term exploration, it is proposed that various solutions Scheme.For example, Chinese patent literature discloses a kind of mandate method for authenticating of cloud file-sharing and system [application number: 201510554226.0], the method includes:After primary user uses the user name of oneself, password login server, upload will be shared File;User interface of the primary user by server end, the token of interpolation primary user, user name and token from user, and The access rights of the shared file from user to currently having uploaded are set;Primary user by the user name of primary user, password and from The token at family informs that from user, from after username and password login service device of the user using primary user, server is obtained and tested Demonstrate,prove the token from user;Server according to checking after from User Token, find the user name from user, and from server Get the access rights to shared file from user.
Again for example, Chinese patent literature discloses a kind of cloud terminal authentication based on cloud computing and system [application number: 201510547290.6], including:A, cloud computing terminal generate Unique Device sequence number;B, reading user identity, with cloud computing terminal The authentication server of connection, verifies to user identity, if user is not present, cloud computing terminal recovers initially to set Put, return to step A;C, by client connection protocol, connect and start cloud virtual machine server cluster;D, judge whether normal Start, if normal startup optimization step 6, if improper startup optimization step 5.
Such scheme to some extent solves the problem that virtual machine is easily stolen under existing cloud environment, but for thing Networked data transmission, without home server, without multiple situations such as network equipment expansion card, still fundamentally cannot solve Cloud service easily stolen paying a secret visit ask, the problem of poor stability.
Content of the invention
The purpose of the present invention is for the problems referred to above, there is provided a kind of easy to operate, security protection high network equipment generation The shared private permission management method of the cloud of reason.
Another object of the present invention is for the problems referred to above, there is provided a kind of hardware structure is simple, high degree of automation The cloud of network equipment agency shares private permission management system.
For reaching above-mentioned purpose, following technical proposal is present invention employs:
The cloud of network equipment agency shares private permission management method, including:
A:Configuration modification is carried out to the legal terminal list of a local user by a network equipment;
B:User is managed by network equipment binding one, is pointed to when application software provides the shared interface of access cloud The network equipment;
C:By the network equipment hijack legitimate local user and/or the access request of remote management user;
D:The network equipment provides secure connection and decryption method, and acts on behalf of the access of the privacy catalogue in cloud share directory, Legal local user and remote management user is allow to access privacy catalogue and/or catalogue on the disclosure in cloud share directory.
The present invention for data transmission of internet of things, without home server, without multiple situations such as network equipment expansion card, Privacy can directly be uploaded and access catalogue, have special safeguard protection effect, also allow for the timely information processing for managing user, can Asked with being effectively prevented stolen the paying a secret visit of cloud share directory.
In the shared private permission management method of cloud that the above-mentioned network equipment is acted on behalf of, described step A and step B can be with Synchronously carry out;
Or, step A is first carried out, then carries out step B;
Or, step B is first carried out, then carries out step A.
Share in private permission management method, in step in the cloud that the above-mentioned network equipment is acted on behalf of, the network equipment Local or Remote configuration modification legal terminal list is carried out to local user.
Share in private permission management method, in step C, by the network equipment in the cloud that the above-mentioned network equipment is acted on behalf of The domain name synchronization for guaranteeing the network equipment and cloud share directory is needed before intercepting and capturing access request.I.e. by sharing the network equipment with cloud The domain name of catalogue is synchronously realizing the access request of network equipment hijack legitimate local user and/or remote management user.
Share in private permission management method in the cloud that the above-mentioned network equipment is acted on behalf of, present invention additionally comprises:
E:When the network equipment intercepts the access request of domestic consumer, cloud shared service is directly accessed, only have and access The authority of the catalogue on the disclosure in cloud share directory.
That is, domestic consumer is not local legal terminal or management user, cloud shared service is directly accessed, not hidden Private directory permission.
Share in private permission management method in the cloud that the above-mentioned network equipment is acted on behalf of, the domestic consumer is non-legally sheet Ground user and/or non-management user.
Share in private permission management method in the cloud that the above-mentioned network equipment is acted on behalf of, the network equipment is connected to Wireless terminal and/or catv terminal.
The shared private permission management method of the cloud of above-mentioned network equipment agency mainly by based on following hardware structures come Realize:
The shared private permission management system of the cloud of present networks proxy for equipment, including the network equipment being arranged in Intranet, institute The local user for being connected with the network equipment is provided with the Intranet that states, and the described network equipment is connected with and is arranged in outer net The cloud share directory with catalogue on the disclosure and privacy catalogue is provided with management user, and described outer net, and described network sets Standby it is connected to catalogue on the disclosure and privacy catalogue;Wherein,
The network equipment, carries out configuration modification for the legal terminal list to local user;
And by network equipment binding management user, network is pointed to when application software provides the shared interface of access cloud Equipment;
And by network equipment hijack legitimate local user and/or the access request of remote management user;
And secure connection and decryption method is provided by the network equipment, and act on behalf of the privacy catalogue in cloud share directory Access, allow legal local user and remote management user to access privacy catalogue and/or catalogue on the disclosure in cloud share directory.
The cloud of described network equipment agency is shared in private permission management system, and the local user passes through wireless terminal And/or catv terminal is connected with the network equipment.
The cloud of described network equipment agency is shared in private permission management system, and the catalogue on the disclosure is connected with common use Family;Wherein:
Domestic consumer, is non-legally local user and/or non-management user, when the network equipment intercepts the visit of domestic consumer When asking request, cloud shared service is directly accessed, only there is the authority for accessing the catalogue on the disclosure in cloud share directory.
The present invention can be realized in data transmission of internet of things or without home server and without network equipment extension Multiple situations such as card, can directly upload privacy and access catalogue, have special safeguard protection effect.
The present invention also has high degree of automation, and hardware structure is simple, and the timely information processing for being easy to manage user, can Asked with being effectively prevented stolen the paying a secret visit of cloud share directory.
Description of the drawings
Flow charts of the Fig. 1 for the embodiment of the present invention one.
Structured flowcharts of the Fig. 2 for the embodiment of the present invention one.
Structured flowcharts of the Fig. 3 for the embodiment of the present invention two.
In figure, Intranet 1, the network equipment 2, local user 3, outer net 4, management user 5, cloud share directory 6, catalogue on the disclosure 61st, privacy catalogue 62, domestic consumer 7.
Specific embodiment
The present invention will be further described in detail with reference to the accompanying drawings and detailed description.
Embodiment one
As shown in Figure 1-2, the shared private permission management method of the cloud of present networks proxy for equipment, including:
Step A:Configuration modification is carried out by the legal terminal list of 2 couples of local users 3 of a network equipment;
Wherein, the network equipment 2 can carry out Local or Remote configuration modification legal terminal list to local user 3;
Here the network equipment 2 is attached to the physical entity in network, is connected to wireless terminal 31 and/or wired Terminal 32, can be computer, hub, switch, bridge, router, gateway etc., by passing through wireless terminal 31 And/or local user is connected by catv terminal 32 with the network equipment.
Step B:
User 5 is managed by the binding of the network equipment 2 one.
The network equipment 2 is pointed to when application software provides the shared interface of access cloud, that is to say, that when application software needs When accessing cloud share directory, need first to guarantee that the network equipment 2 is bound with management user 5;
Wherein, above-mentioned steps A and step B synchronously can be carried out;
Or, step A is first carried out, then carries out step B;
Or, step B is first carried out, step A is being carried out.
Can carry out simultaneously for the list of configuration modification legal terminal and by 2 binding management user 5 of the network equipment Can carry out successively respectively, and the order for carrying out successively is adjustable.
After execution of step A and step B, and then execution step C:
First passing through needs the domain name for guaranteeing the network equipment 2 and cloud share directory 6 same before the network equipment 2 intercepts and captures access request Step, i.e., by the network equipment 2 is synchronous with the domain name of cloud share directory 6;
Then, by 2 hijack legitimate local user of the network equipment and/or the access request of remote management user 5.
Further, step D:The network equipment 2 provides secure connection and decryption method, and acts on behalf of in cloud share directory 6 The access of privacy catalogue 62, allows legal local user and remote management user 5 to access the privacy catalogue in cloud share directory 6 62 and/or catalogue on the disclosure 61.
Using this kind of method for data transmission of internet of things, without home server, many without network equipment expansion card etc. Situation is planted, privacy can be directly uploaded and be accessed catalogue, have special safeguard protection effect, also allow for the timely information for managing user Process, stolen the paying a secret visit of cloud share directory can be effectively prevented and asked.
Here enumerate and said method is illustrated:For example:
S1:The network equipment is connected by terminal units such as mobile phone, computers, and Local or Remote configuration is carried out to local user Modification legal terminal list;
Local user is included using being legal local user during which terminal, is that non-legally is local during with which terminal User.
S2:By being bound management user and the network equipment, the legal identity for managing user is so guaranteed;
Network can be pointing directly at when management user is using the accessible with application software cloud shared interface on mobile phone, computer to set Standby, need to carry out key identification etc. again, situations such as thus prevent key from stealing.
S3:By the domain name synchronization by the network equipment and cloud share directory, it is ensured that legal local user or remote management are used When family using terminal accesses cloud share directory, the network equipment can rapidly and accurately intercept legal local user or remote management in time The access request of user;
S4:Secure connection and decryption method are provided by the network equipment, the access of privacy catalogue is acted on behalf of, makes the validated user can To access the catalogue of two kinds of different rights, key input is carried out as terminal need not be accessed, which ensures that safety;
Meanwhile, the network equipment has acted on behalf of the access of privacy catalogue, and so only legal local user or management user are Not only can access catalogue on the disclosure but also privacy catalogue can be accessed.
That is, for enterprise can be by the cloud service of company, such as the cloud share directory in cloud disk is divided into open mesh Record and privacy catalogue, the list that validated user is determined by the network equipment, and pass through network equipment binding management user;
When user accesses cloud share directory, the network equipment can tell active user be whether legal local user or Management user;
When the network equipment judges active user for legal local user or management user, as the network equipment and cloud are shared Catalogue domain name synchronization, the network equipment can be truncated to legal local user or management user access request in time;
Then secure connection and decryption method are provided by the network equipment, acts on behalf of the access of privacy catalogue, make validated user The catalogue of two kinds of different rights can be accessed;
When the network equipment judges active user for non-legally local user or non-management user, the network equipment will not ground section User access request is taken, and active user can only access the catalogue on the disclosure of cloud share directory, do not access the authority of privacy catalogue.
What the present embodiment was also mainly used in elaboration is said method is realized under a kind of what kind of hardware environment;
Or;
Say that the cloud using above-mentioned network equipment agency is shared the cloud of the network equipment agency of private permission management method and shared Private permission management system is what kind of hardware structure a kind of, specific as follows:
The shared private permission management system of this cloud, including:
The network equipment 2 being arranged in Intranet 1;
The local user 3 for being connected with the network equipment 2 is provided with described Intranet 1;
The described network equipment 2 is connected with the management user 5 being arranged in outer net 4;
And in described outer net 4, it is provided with cloud share directory 6 with catalogue on the disclosure 61 and privacy catalogue 62;
And the described network equipment 2 is connected to catalogue on the disclosure 61 and privacy catalogue 62;
Wherein:
The network equipment 2, carries out configuration modification for the legal terminal list to local user 3;
And by 2 binding management user 5 of the network equipment, net is pointed to when application software provides the shared interface of access cloud Network equipment 2;
And by 2 hijack legitimate local user of the network equipment and/or the access request of remote management user 5;
And secure connection and decryption method is provided by the network equipment 2, and act on behalf of the privacy catalogue in cloud share directory 6 62 access, allows legal local user and remote management user to access the privacy catalogue 62 in cloud share directory 6 and/or public affairs Open catalogue 61.
The system has hardware structure simple, high degree of automation, and the timely information processing for being easy to manage user, can be with It is effectively prevented stolen the paying a secret visit of cloud share directory to ask.
Wherein, local user 3 is connected with the network equipment 2 by wireless terminal 31 and/or catv terminal 32.
This enforcement low speed can be realized in data transmission of internet of things or without home server and without the network equipment Multiple situations such as expansion card, can directly upload privacy and access catalogue, have safeguard protection to act on.
Embodiment two
The structure of the present embodiment, principle and implementation steps are similar with embodiment one, are where difference:
As shown in figure 3, the catalogue on the disclosure 61 in the shared private permission management system of the cloud of the network equipment agency of the present invention It is also associated with domestic consumer 7;Wherein:
Domestic consumer 7, is non-legally local user and/or non-management user, when the network equipment 2 intercepts domestic consumer 7 Access request when, directly access cloud shared service, only there is the authority for accessing the catalogue on the disclosure 61 in cloud share directory 6.
After embodiment one has been executed, the present invention can also include:
Step E:When the network equipment 2 intercepts the access request of domestic consumer 7, it is preferable that domestic consumer 7 here is Non-legally local user and/or non-management user, directly access cloud shared service, only there are the public affairs accessed in cloud share directory 6 Open the authority of catalogue 61;That is, domestic consumer is not local legal terminal or management user, the shared clothes of cloud are directly accessed Business, without privacy directory permission.
Specifically, as the network equipment 2 in embodiment one was carried out to the legal terminal list of local user 3 Configuration modification, and the network equipment 2 also bound management user 5.
Therefore, when the generic access cloud shared service of similar non-legally local user or non-management user, the network equipment It is easy to identify these domestic consumers.
After identifying, domestic consumer can directly access the catalogue on the disclosure in cloud share directory, but for cloud shared Privacy catalogue in catalogue, domestic consumer do not have access rights.
Compared with prior art, the shared private permission management method of the cloud of inventive network proxy for equipment and system is excellent Point is:
1st, of the invention for data transmission of internet of things, without home server, without multiple feelings such as network equipment expansion card Shape, its can directly upload privacy and access catalogue, have special safeguard protection effect.
2nd, the present invention also has high degree of automation, and hardware structure is simple, and the timely information processing for being easy to manage user, Stolen the paying a secret visit of cloud share directory can be effectively prevented to ask.
Specific embodiment described herein is only to the spiritual explanation for example of the present invention.Technology neck belonging to of the invention The technical staff in domain can be made various modifications or supplement or replaced using similar mode to described specific embodiment Generation, but without departing from the spiritual of the present invention or surmount scope defined in appended claims.
Although more having used Intranet 1, the network equipment 2, local user 3, outer net 4, management user 5, cloud to share herein The terms such as catalogue 6, catalogue on the disclosure 61, privacy catalogue 62, domestic consumer 7, but it is not precluded from the probability using other terms.Make It is used for the purpose of the essence for more easily describing and explaining the present invention with these terms;It is construed as what any one was added It is all contrary with spirit of the invention to limit.

Claims (10)

1. a kind of cloud of network equipment agency shares private permission management method, it is characterised in that this method comprises the steps:
A:Configuration modification is carried out to the legal terminal list of a local user (3) by a network equipment (2);
B:User (5) is managed by the network equipment (2) binding one, is referred to when application software provides the shared interface of access cloud To the network equipment (2);
C:By the network equipment (2) hijack legitimate local user (3) and/or the access request of remote management user (5);
D:The network equipment (2) provides secure connection and decryption method, and acts on behalf of the privacy catalogue (62) in cloud share directory (6) Access, make legal local user (3) and remote management user (5) can access the privacy catalogue (62) in cloud share directory (6) and/ Or catalogue on the disclosure (61).
2. the cloud of network equipment agency according to claim 1 shares private permission management method, it is characterised in that described The step of A and step B synchronously carry out;Or, first carry out step B, then execution step A.
3. the cloud of network equipment agency according to claim 1 and 2 shares private permission management method, it is characterised in that In step, the network equipment (2) carry out Local or Remote configuration modification legal terminal list to local user (3).
4. the cloud of network equipment agency according to claim 3 shares private permission management method, it is characterised in that in step In rapid C, before intercepting and capturing access request by the network equipment (2), need the domain name for guaranteeing the network equipment (2) and cloud share directory (6) same Step.
5. the cloud of network equipment agency according to claim 1 or claim 2 shares private permission management method, it is characterised in that this Method also includes:
E:When the network equipment (2) intercepts the access request of domestic consumer (7), cloud shared service is directly accessed, only have and visit Ask the authority of the catalogue on the disclosure (61) in cloud share directory (6).
6. the cloud of network equipment agency according to claim 5 shares private permission management method, it is characterised in that described Domestic consumer (7) is non-legally local user (3) and/or non-management user.
7. the cloud of network equipment agency according to claim 3 shares private permission management method, it is characterised in that described The network equipment (2) is connected to wireless terminal (31) and/or catv terminal (32).
8. described in a kind of any one of employing claim 1-7, the cloud of network equipment agency shares the network of private permission management method The shared private permission management system of the cloud of proxy for equipment, it is characterised in that including the network equipment (2) being arranged in Intranet (1), The local user (3) for being connected with the network equipment (2) is provided with described Intranet (1), and the described network equipment (2) is connected with It is provided with catalogue on the disclosure (61) and privacy catalogue in the management user (5) being arranged in outer net (4), and described outer net (4) (62) cloud share directory (6), and the described network equipment (2) is connected to catalogue on the disclosure (61) and privacy catalogue (62); Wherein:
The network equipment (2), for carrying out configuration modification and passing through the network equipment (2) to the legal terminal list of local user (3) Binding management user (5), points to the network equipment (2) when application software provides the shared interface of access cloud;And pass through network Equipment (2) hijack legitimate local user (3) and/or the access request of remote management user (5);And pass through the network equipment (2) Secure connection and decryption method be provided, and act on behalf of the access of the privacy catalogue (62) in cloud share directory (6), make legal local use Family (3) and remote management user (5) can access the privacy catalogue (62) in cloud share directory (6) and/or catalogue on the disclosure (61).
9. the cloud of network equipment agency according to claim 8 shares private permission management system, it is characterised in that described Local user (3) is connected with the network equipment (2) by wireless terminal (31) and/or catv terminal (32).
10. the cloud of network equipment agency according to claim 9 shares private permission management system, it is characterised in that institute State catalogue on the disclosure (61) and be connected with domestic consumer (7);Wherein:
Domestic consumer (7), is non-legally local user (3) and/or non-management user, when the network equipment (2) intercepts common use During the access request at family (7), cloud shared service is directly accessed, only there is the catalogue on the disclosure (61) accessed in cloud share directory (6) Authority.
CN201611227611.5A 2016-12-27 2016-12-27 The cloud of network equipment agency shares private permission management method and system Pending CN106506549A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611227611.5A CN106506549A (en) 2016-12-27 2016-12-27 The cloud of network equipment agency shares private permission management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611227611.5A CN106506549A (en) 2016-12-27 2016-12-27 The cloud of network equipment agency shares private permission management method and system

Publications (1)

Publication Number Publication Date
CN106506549A true CN106506549A (en) 2017-03-15

Family

ID=58334377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611227611.5A Pending CN106506549A (en) 2016-12-27 2016-12-27 The cloud of network equipment agency shares private permission management method and system

Country Status (1)

Country Link
CN (1) CN106506549A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577270A (en) * 2009-09-30 2012-07-11 阿尔卡特朗讯公司 Scalable architecture for enterprise extension in a cloud topology
CN104239814A (en) * 2014-09-17 2014-12-24 上海斐讯数据通信技术有限公司 Mobile office safety method and mobile office safety system
CN104838630A (en) * 2012-10-10 2015-08-12 思杰系统有限公司 Policy-based application management
CN105740717A (en) * 2016-01-29 2016-07-06 四川效率源信息安全技术股份有限公司 Method and apparatus for performing electronic data file protection based on encrypted partition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102577270A (en) * 2009-09-30 2012-07-11 阿尔卡特朗讯公司 Scalable architecture for enterprise extension in a cloud topology
CN104838630A (en) * 2012-10-10 2015-08-12 思杰系统有限公司 Policy-based application management
CN104239814A (en) * 2014-09-17 2014-12-24 上海斐讯数据通信技术有限公司 Mobile office safety method and mobile office safety system
CN105740717A (en) * 2016-01-29 2016-07-06 四川效率源信息安全技术股份有限公司 Method and apparatus for performing electronic data file protection based on encrypted partition

Similar Documents

Publication Publication Date Title
US8281381B2 (en) Techniques for environment single sign on
CN106411857B (en) A kind of private clound GIS service access control method based on virtual isolation mech isolation test
CN101771677B (en) Method for providing resource for access user, server and system thereof
US9047462B2 (en) Computer account management system and realizing method thereof
CN103001999B (en) For privately owned Cloud Server, intelligent apparatus client and the method for public cloud network
CN101986599B (en) Network security control method based on cloud service and cloud security gateway
AU2014388268A1 (en) System and method for biometric protocol standards
US9871778B1 (en) Secure authentication to provide mobile access to shared network resources
Yutaka et al. Using ethereum blockchain for distributed attribute-based access control in the internet of things
BR112016000122B1 (en) METHOD AND SYSTEM RELATED TO USER AUTHENTICATION TO ACCESS DATA NETWORKS
Chandel et al. Enterprise cloud: Its growth & security challenges in China
RU2415466C1 (en) Method of controlling identification of users of information resources of heterogeneous computer network
AU2004203412B2 (en) Moving principals across security boundaries without service interruption
CN106330836A (en) Access control method for client by server
KR20120067105A (en) Social verification login system being possible to verify user and providing method thereof
Saini et al. Identity management issues in cloud computing
Shaikh et al. Identity management in cloud computing
CN108989334A (en) A kind of SSO single-point logging method based on JAVA
CN205829695U (en) A kind of new purview certification system based on the network storage equipment
CN106506549A (en) The cloud of network equipment agency shares private permission management method and system
US11647020B2 (en) Satellite service for machine authentication in hybrid environments
Varadharajan Design and Management of a Secure Networked Administration System: A Practical Approach
CN108900487B (en) Shared net disk for implanting middleware
Habiba et al. Assessment criteria for cloud identity management systems
Park et al. Constructing a secure hacking-resistant IoT U-healthcare environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170315