CN106506549A - The cloud of network equipment agency shares private permission management method and system - Google Patents
The cloud of network equipment agency shares private permission management method and system Download PDFInfo
- Publication number
- CN106506549A CN106506549A CN201611227611.5A CN201611227611A CN106506549A CN 106506549 A CN106506549 A CN 106506549A CN 201611227611 A CN201611227611 A CN 201611227611A CN 106506549 A CN106506549 A CN 106506549A
- Authority
- CN
- China
- Prior art keywords
- network equipment
- cloud
- user
- catalogue
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Abstract
The present invention relates to a kind of cloud of network equipment agency shares private permission management method and system.The inventive method step is as follows:A:Configuration modification is carried out to the legal terminal list of a local user by the network equipment;B:By the network equipment binding management user, the network equipment is pointed to when application software provides the shared interface of access cloud;C:By network equipment hijack legitimate local user and/or the access request of management user;D:The network equipment provides secure connection and decryption method, and acts on behalf of the access of the privacy catalogue in cloud share directory, allows legal local user and management user to access privacy catalogue and/or catalogue on the disclosure in cloud share directory.Advantage is:Realize in data transmission of internet of things or without home server and without multiple situations such as network equipment expansion card, can directly upload privacy and access catalogue have special safeguard protection effect.
Description
Technical field
The invention belongs to cloud service technical field, shares private permission pipe more particularly, to the cloud that a kind of network equipment is acted on behalf of
Reason method and system.
Background technology
Cloud service is increase, use and the delivery mode of the related service based on the Internet, is usually directed to by the Internet
To provide dynamic easily extension and often virtualized resource.Cloud service refer to by network with demand, easy extension way obtain
Required service.This service can be that IT is related with software, the Internet, may also be other services.It means computing capability
Can be circulated by the Internet as a kind of commodity.In simple terms, cloud service can be needed for by enterprise software and hardware, data are all
It is put on network, at any time and place, is interconnected using different information technoloy equipments, realize the purposes such as data access, computing,
I.e. data center can provide cloud account and the communal space for the access device of network side, and such user's activation equipment simultaneously binds cloud
After account, it is possible to access cloud shared data.
Currently, common cloud service has two kinds of public cloud and private clound, and wherein, public cloud cost is relatively low, and which is most basic
Service, multiple clients can share the system resource of a service provider, and they needn't set up any equipment and be equipped with management
Personnel, just can enjoy the IT services of specialty, and, for general entrepreneur, medium and small enterprise, undoubtedly a reduces cost is good for this
Method.The operation form of private clound, similar with public cloud.However, it is but a significant investment to set up private clound, enterprise need to voluntarily
Design data center, network, storage device, and have the advisory group of specialty.Enterprise management level must take into full account use
The necessity of private clound, and whether have enough resources to guarantee private clound normal operation.But the net in due to cloud service
The rights management of network file-sharing may relate to access of stealing secret information mainly by user's key once key is leaked or is cracked, this
Larger threat is there is for user security.
In order to improve the problem of prior art presence, people have carried out long-term exploration, it is proposed that various solutions
Scheme.For example, Chinese patent literature discloses a kind of mandate method for authenticating of cloud file-sharing and system [application number:
201510554226.0], the method includes:After primary user uses the user name of oneself, password login server, upload will be shared
File;User interface of the primary user by server end, the token of interpolation primary user, user name and token from user, and
The access rights of the shared file from user to currently having uploaded are set;Primary user by the user name of primary user, password and from
The token at family informs that from user, from after username and password login service device of the user using primary user, server is obtained and tested
Demonstrate,prove the token from user;Server according to checking after from User Token, find the user name from user, and from server
Get the access rights to shared file from user.
Again for example, Chinese patent literature discloses a kind of cloud terminal authentication based on cloud computing and system [application number:
201510547290.6], including:A, cloud computing terminal generate Unique Device sequence number;B, reading user identity, with cloud computing terminal
The authentication server of connection, verifies to user identity, if user is not present, cloud computing terminal recovers initially to set
Put, return to step A;C, by client connection protocol, connect and start cloud virtual machine server cluster;D, judge whether normal
Start, if normal startup optimization step 6, if improper startup optimization step 5.
Such scheme to some extent solves the problem that virtual machine is easily stolen under existing cloud environment, but for thing
Networked data transmission, without home server, without multiple situations such as network equipment expansion card, still fundamentally cannot solve
Cloud service easily stolen paying a secret visit ask, the problem of poor stability.
Content of the invention
The purpose of the present invention is for the problems referred to above, there is provided a kind of easy to operate, security protection high network equipment generation
The shared private permission management method of the cloud of reason.
Another object of the present invention is for the problems referred to above, there is provided a kind of hardware structure is simple, high degree of automation
The cloud of network equipment agency shares private permission management system.
For reaching above-mentioned purpose, following technical proposal is present invention employs:
The cloud of network equipment agency shares private permission management method, including:
A:Configuration modification is carried out to the legal terminal list of a local user by a network equipment;
B:User is managed by network equipment binding one, is pointed to when application software provides the shared interface of access cloud
The network equipment;
C:By the network equipment hijack legitimate local user and/or the access request of remote management user;
D:The network equipment provides secure connection and decryption method, and acts on behalf of the access of the privacy catalogue in cloud share directory,
Legal local user and remote management user is allow to access privacy catalogue and/or catalogue on the disclosure in cloud share directory.
The present invention for data transmission of internet of things, without home server, without multiple situations such as network equipment expansion card,
Privacy can directly be uploaded and access catalogue, have special safeguard protection effect, also allow for the timely information processing for managing user, can
Asked with being effectively prevented stolen the paying a secret visit of cloud share directory.
In the shared private permission management method of cloud that the above-mentioned network equipment is acted on behalf of, described step A and step B can be with
Synchronously carry out;
Or, step A is first carried out, then carries out step B;
Or, step B is first carried out, then carries out step A.
Share in private permission management method, in step in the cloud that the above-mentioned network equipment is acted on behalf of, the network equipment
Local or Remote configuration modification legal terminal list is carried out to local user.
Share in private permission management method, in step C, by the network equipment in the cloud that the above-mentioned network equipment is acted on behalf of
The domain name synchronization for guaranteeing the network equipment and cloud share directory is needed before intercepting and capturing access request.I.e. by sharing the network equipment with cloud
The domain name of catalogue is synchronously realizing the access request of network equipment hijack legitimate local user and/or remote management user.
Share in private permission management method in the cloud that the above-mentioned network equipment is acted on behalf of, present invention additionally comprises:
E:When the network equipment intercepts the access request of domestic consumer, cloud shared service is directly accessed, only have and access
The authority of the catalogue on the disclosure in cloud share directory.
That is, domestic consumer is not local legal terminal or management user, cloud shared service is directly accessed, not hidden
Private directory permission.
Share in private permission management method in the cloud that the above-mentioned network equipment is acted on behalf of, the domestic consumer is non-legally sheet
Ground user and/or non-management user.
Share in private permission management method in the cloud that the above-mentioned network equipment is acted on behalf of, the network equipment is connected to
Wireless terminal and/or catv terminal.
The shared private permission management method of the cloud of above-mentioned network equipment agency mainly by based on following hardware structures come
Realize:
The shared private permission management system of the cloud of present networks proxy for equipment, including the network equipment being arranged in Intranet, institute
The local user for being connected with the network equipment is provided with the Intranet that states, and the described network equipment is connected with and is arranged in outer net
The cloud share directory with catalogue on the disclosure and privacy catalogue is provided with management user, and described outer net, and described network sets
Standby it is connected to catalogue on the disclosure and privacy catalogue;Wherein,
The network equipment, carries out configuration modification for the legal terminal list to local user;
And by network equipment binding management user, network is pointed to when application software provides the shared interface of access cloud
Equipment;
And by network equipment hijack legitimate local user and/or the access request of remote management user;
And secure connection and decryption method is provided by the network equipment, and act on behalf of the privacy catalogue in cloud share directory
Access, allow legal local user and remote management user to access privacy catalogue and/or catalogue on the disclosure in cloud share directory.
The cloud of described network equipment agency is shared in private permission management system, and the local user passes through wireless terminal
And/or catv terminal is connected with the network equipment.
The cloud of described network equipment agency is shared in private permission management system, and the catalogue on the disclosure is connected with common use
Family;Wherein:
Domestic consumer, is non-legally local user and/or non-management user, when the network equipment intercepts the visit of domestic consumer
When asking request, cloud shared service is directly accessed, only there is the authority for accessing the catalogue on the disclosure in cloud share directory.
The present invention can be realized in data transmission of internet of things or without home server and without network equipment extension
Multiple situations such as card, can directly upload privacy and access catalogue, have special safeguard protection effect.
The present invention also has high degree of automation, and hardware structure is simple, and the timely information processing for being easy to manage user, can
Asked with being effectively prevented stolen the paying a secret visit of cloud share directory.
Description of the drawings
Flow charts of the Fig. 1 for the embodiment of the present invention one.
Structured flowcharts of the Fig. 2 for the embodiment of the present invention one.
Structured flowcharts of the Fig. 3 for the embodiment of the present invention two.
In figure, Intranet 1, the network equipment 2, local user 3, outer net 4, management user 5, cloud share directory 6, catalogue on the disclosure
61st, privacy catalogue 62, domestic consumer 7.
Specific embodiment
The present invention will be further described in detail with reference to the accompanying drawings and detailed description.
Embodiment one
As shown in Figure 1-2, the shared private permission management method of the cloud of present networks proxy for equipment, including:
Step A:Configuration modification is carried out by the legal terminal list of 2 couples of local users 3 of a network equipment;
Wherein, the network equipment 2 can carry out Local or Remote configuration modification legal terminal list to local user 3;
Here the network equipment 2 is attached to the physical entity in network, is connected to wireless terminal 31 and/or wired
Terminal 32, can be computer, hub, switch, bridge, router, gateway etc., by passing through wireless terminal 31
And/or local user is connected by catv terminal 32 with the network equipment.
Step B:
User 5 is managed by the binding of the network equipment 2 one.
The network equipment 2 is pointed to when application software provides the shared interface of access cloud, that is to say, that when application software needs
When accessing cloud share directory, need first to guarantee that the network equipment 2 is bound with management user 5;
Wherein, above-mentioned steps A and step B synchronously can be carried out;
Or, step A is first carried out, then carries out step B;
Or, step B is first carried out, step A is being carried out.
Can carry out simultaneously for the list of configuration modification legal terminal and by 2 binding management user 5 of the network equipment
Can carry out successively respectively, and the order for carrying out successively is adjustable.
After execution of step A and step B, and then execution step C:
First passing through needs the domain name for guaranteeing the network equipment 2 and cloud share directory 6 same before the network equipment 2 intercepts and captures access request
Step, i.e., by the network equipment 2 is synchronous with the domain name of cloud share directory 6;
Then, by 2 hijack legitimate local user of the network equipment and/or the access request of remote management user 5.
Further, step D:The network equipment 2 provides secure connection and decryption method, and acts on behalf of in cloud share directory 6
The access of privacy catalogue 62, allows legal local user and remote management user 5 to access the privacy catalogue in cloud share directory 6
62 and/or catalogue on the disclosure 61.
Using this kind of method for data transmission of internet of things, without home server, many without network equipment expansion card etc.
Situation is planted, privacy can be directly uploaded and be accessed catalogue, have special safeguard protection effect, also allow for the timely information for managing user
Process, stolen the paying a secret visit of cloud share directory can be effectively prevented and asked.
Here enumerate and said method is illustrated:For example:
S1:The network equipment is connected by terminal units such as mobile phone, computers, and Local or Remote configuration is carried out to local user
Modification legal terminal list;
Local user is included using being legal local user during which terminal, is that non-legally is local during with which terminal
User.
S2:By being bound management user and the network equipment, the legal identity for managing user is so guaranteed;
Network can be pointing directly at when management user is using the accessible with application software cloud shared interface on mobile phone, computer to set
Standby, need to carry out key identification etc. again, situations such as thus prevent key from stealing.
S3:By the domain name synchronization by the network equipment and cloud share directory, it is ensured that legal local user or remote management are used
When family using terminal accesses cloud share directory, the network equipment can rapidly and accurately intercept legal local user or remote management in time
The access request of user;
S4:Secure connection and decryption method are provided by the network equipment, the access of privacy catalogue is acted on behalf of, makes the validated user can
To access the catalogue of two kinds of different rights, key input is carried out as terminal need not be accessed, which ensures that safety;
Meanwhile, the network equipment has acted on behalf of the access of privacy catalogue, and so only legal local user or management user are
Not only can access catalogue on the disclosure but also privacy catalogue can be accessed.
That is, for enterprise can be by the cloud service of company, such as the cloud share directory in cloud disk is divided into open mesh
Record and privacy catalogue, the list that validated user is determined by the network equipment, and pass through network equipment binding management user;
When user accesses cloud share directory, the network equipment can tell active user be whether legal local user or
Management user;
When the network equipment judges active user for legal local user or management user, as the network equipment and cloud are shared
Catalogue domain name synchronization, the network equipment can be truncated to legal local user or management user access request in time;
Then secure connection and decryption method are provided by the network equipment, acts on behalf of the access of privacy catalogue, make validated user
The catalogue of two kinds of different rights can be accessed;
When the network equipment judges active user for non-legally local user or non-management user, the network equipment will not ground section
User access request is taken, and active user can only access the catalogue on the disclosure of cloud share directory, do not access the authority of privacy catalogue.
What the present embodiment was also mainly used in elaboration is said method is realized under a kind of what kind of hardware environment;
Or;
Say that the cloud using above-mentioned network equipment agency is shared the cloud of the network equipment agency of private permission management method and shared
Private permission management system is what kind of hardware structure a kind of, specific as follows:
The shared private permission management system of this cloud, including:
The network equipment 2 being arranged in Intranet 1;
The local user 3 for being connected with the network equipment 2 is provided with described Intranet 1;
The described network equipment 2 is connected with the management user 5 being arranged in outer net 4;
And in described outer net 4, it is provided with cloud share directory 6 with catalogue on the disclosure 61 and privacy catalogue 62;
And the described network equipment 2 is connected to catalogue on the disclosure 61 and privacy catalogue 62;
Wherein:
The network equipment 2, carries out configuration modification for the legal terminal list to local user 3;
And by 2 binding management user 5 of the network equipment, net is pointed to when application software provides the shared interface of access cloud
Network equipment 2;
And by 2 hijack legitimate local user of the network equipment and/or the access request of remote management user 5;
And secure connection and decryption method is provided by the network equipment 2, and act on behalf of the privacy catalogue in cloud share directory 6
62 access, allows legal local user and remote management user to access the privacy catalogue 62 in cloud share directory 6 and/or public affairs
Open catalogue 61.
The system has hardware structure simple, high degree of automation, and the timely information processing for being easy to manage user, can be with
It is effectively prevented stolen the paying a secret visit of cloud share directory to ask.
Wherein, local user 3 is connected with the network equipment 2 by wireless terminal 31 and/or catv terminal 32.
This enforcement low speed can be realized in data transmission of internet of things or without home server and without the network equipment
Multiple situations such as expansion card, can directly upload privacy and access catalogue, have safeguard protection to act on.
Embodiment two
The structure of the present embodiment, principle and implementation steps are similar with embodiment one, are where difference:
As shown in figure 3, the catalogue on the disclosure 61 in the shared private permission management system of the cloud of the network equipment agency of the present invention
It is also associated with domestic consumer 7;Wherein:
Domestic consumer 7, is non-legally local user and/or non-management user, when the network equipment 2 intercepts domestic consumer 7
Access request when, directly access cloud shared service, only there is the authority for accessing the catalogue on the disclosure 61 in cloud share directory 6.
After embodiment one has been executed, the present invention can also include:
Step E:When the network equipment 2 intercepts the access request of domestic consumer 7, it is preferable that domestic consumer 7 here is
Non-legally local user and/or non-management user, directly access cloud shared service, only there are the public affairs accessed in cloud share directory 6
Open the authority of catalogue 61;That is, domestic consumer is not local legal terminal or management user, the shared clothes of cloud are directly accessed
Business, without privacy directory permission.
Specifically, as the network equipment 2 in embodiment one was carried out to the legal terminal list of local user 3
Configuration modification, and the network equipment 2 also bound management user 5.
Therefore, when the generic access cloud shared service of similar non-legally local user or non-management user, the network equipment
It is easy to identify these domestic consumers.
After identifying, domestic consumer can directly access the catalogue on the disclosure in cloud share directory, but for cloud shared
Privacy catalogue in catalogue, domestic consumer do not have access rights.
Compared with prior art, the shared private permission management method of the cloud of inventive network proxy for equipment and system is excellent
Point is:
1st, of the invention for data transmission of internet of things, without home server, without multiple feelings such as network equipment expansion card
Shape, its can directly upload privacy and access catalogue, have special safeguard protection effect.
2nd, the present invention also has high degree of automation, and hardware structure is simple, and the timely information processing for being easy to manage user,
Stolen the paying a secret visit of cloud share directory can be effectively prevented to ask.
Specific embodiment described herein is only to the spiritual explanation for example of the present invention.Technology neck belonging to of the invention
The technical staff in domain can be made various modifications or supplement or replaced using similar mode to described specific embodiment
Generation, but without departing from the spiritual of the present invention or surmount scope defined in appended claims.
Although more having used Intranet 1, the network equipment 2, local user 3, outer net 4, management user 5, cloud to share herein
The terms such as catalogue 6, catalogue on the disclosure 61, privacy catalogue 62, domestic consumer 7, but it is not precluded from the probability using other terms.Make
It is used for the purpose of the essence for more easily describing and explaining the present invention with these terms;It is construed as what any one was added
It is all contrary with spirit of the invention to limit.
Claims (10)
1. a kind of cloud of network equipment agency shares private permission management method, it is characterised in that this method comprises the steps:
A:Configuration modification is carried out to the legal terminal list of a local user (3) by a network equipment (2);
B:User (5) is managed by the network equipment (2) binding one, is referred to when application software provides the shared interface of access cloud
To the network equipment (2);
C:By the network equipment (2) hijack legitimate local user (3) and/or the access request of remote management user (5);
D:The network equipment (2) provides secure connection and decryption method, and acts on behalf of the privacy catalogue (62) in cloud share directory (6)
Access, make legal local user (3) and remote management user (5) can access the privacy catalogue (62) in cloud share directory (6) and/
Or catalogue on the disclosure (61).
2. the cloud of network equipment agency according to claim 1 shares private permission management method, it is characterised in that described
The step of A and step B synchronously carry out;Or, first carry out step B, then execution step A.
3. the cloud of network equipment agency according to claim 1 and 2 shares private permission management method, it is characterised in that
In step, the network equipment (2) carry out Local or Remote configuration modification legal terminal list to local user (3).
4. the cloud of network equipment agency according to claim 3 shares private permission management method, it is characterised in that in step
In rapid C, before intercepting and capturing access request by the network equipment (2), need the domain name for guaranteeing the network equipment (2) and cloud share directory (6) same
Step.
5. the cloud of network equipment agency according to claim 1 or claim 2 shares private permission management method, it is characterised in that this
Method also includes:
E:When the network equipment (2) intercepts the access request of domestic consumer (7), cloud shared service is directly accessed, only have and visit
Ask the authority of the catalogue on the disclosure (61) in cloud share directory (6).
6. the cloud of network equipment agency according to claim 5 shares private permission management method, it is characterised in that described
Domestic consumer (7) is non-legally local user (3) and/or non-management user.
7. the cloud of network equipment agency according to claim 3 shares private permission management method, it is characterised in that described
The network equipment (2) is connected to wireless terminal (31) and/or catv terminal (32).
8. described in a kind of any one of employing claim 1-7, the cloud of network equipment agency shares the network of private permission management method
The shared private permission management system of the cloud of proxy for equipment, it is characterised in that including the network equipment (2) being arranged in Intranet (1),
The local user (3) for being connected with the network equipment (2) is provided with described Intranet (1), and the described network equipment (2) is connected with
It is provided with catalogue on the disclosure (61) and privacy catalogue in the management user (5) being arranged in outer net (4), and described outer net (4)
(62) cloud share directory (6), and the described network equipment (2) is connected to catalogue on the disclosure (61) and privacy catalogue (62);
Wherein:
The network equipment (2), for carrying out configuration modification and passing through the network equipment (2) to the legal terminal list of local user (3)
Binding management user (5), points to the network equipment (2) when application software provides the shared interface of access cloud;And pass through network
Equipment (2) hijack legitimate local user (3) and/or the access request of remote management user (5);And pass through the network equipment (2)
Secure connection and decryption method be provided, and act on behalf of the access of the privacy catalogue (62) in cloud share directory (6), make legal local use
Family (3) and remote management user (5) can access the privacy catalogue (62) in cloud share directory (6) and/or catalogue on the disclosure (61).
9. the cloud of network equipment agency according to claim 8 shares private permission management system, it is characterised in that described
Local user (3) is connected with the network equipment (2) by wireless terminal (31) and/or catv terminal (32).
10. the cloud of network equipment agency according to claim 9 shares private permission management system, it is characterised in that institute
State catalogue on the disclosure (61) and be connected with domestic consumer (7);Wherein:
Domestic consumer (7), is non-legally local user (3) and/or non-management user, when the network equipment (2) intercepts common use
During the access request at family (7), cloud shared service is directly accessed, only there is the catalogue on the disclosure (61) accessed in cloud share directory (6)
Authority.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611227611.5A CN106506549A (en) | 2016-12-27 | 2016-12-27 | The cloud of network equipment agency shares private permission management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611227611.5A CN106506549A (en) | 2016-12-27 | 2016-12-27 | The cloud of network equipment agency shares private permission management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106506549A true CN106506549A (en) | 2017-03-15 |
Family
ID=58334377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611227611.5A Pending CN106506549A (en) | 2016-12-27 | 2016-12-27 | The cloud of network equipment agency shares private permission management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106506549A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102577270A (en) * | 2009-09-30 | 2012-07-11 | 阿尔卡特朗讯公司 | Scalable architecture for enterprise extension in a cloud topology |
CN104239814A (en) * | 2014-09-17 | 2014-12-24 | 上海斐讯数据通信技术有限公司 | Mobile office safety method and mobile office safety system |
CN104838630A (en) * | 2012-10-10 | 2015-08-12 | 思杰系统有限公司 | Policy-based application management |
CN105740717A (en) * | 2016-01-29 | 2016-07-06 | 四川效率源信息安全技术股份有限公司 | Method and apparatus for performing electronic data file protection based on encrypted partition |
-
2016
- 2016-12-27 CN CN201611227611.5A patent/CN106506549A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102577270A (en) * | 2009-09-30 | 2012-07-11 | 阿尔卡特朗讯公司 | Scalable architecture for enterprise extension in a cloud topology |
CN104838630A (en) * | 2012-10-10 | 2015-08-12 | 思杰系统有限公司 | Policy-based application management |
CN104239814A (en) * | 2014-09-17 | 2014-12-24 | 上海斐讯数据通信技术有限公司 | Mobile office safety method and mobile office safety system |
CN105740717A (en) * | 2016-01-29 | 2016-07-06 | 四川效率源信息安全技术股份有限公司 | Method and apparatus for performing electronic data file protection based on encrypted partition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8281381B2 (en) | Techniques for environment single sign on | |
CN106411857B (en) | A kind of private clound GIS service access control method based on virtual isolation mech isolation test | |
CN101771677B (en) | Method for providing resource for access user, server and system thereof | |
US9047462B2 (en) | Computer account management system and realizing method thereof | |
CN103001999B (en) | For privately owned Cloud Server, intelligent apparatus client and the method for public cloud network | |
CN101986599B (en) | Network security control method based on cloud service and cloud security gateway | |
AU2014388268A1 (en) | System and method for biometric protocol standards | |
US9871778B1 (en) | Secure authentication to provide mobile access to shared network resources | |
Yutaka et al. | Using ethereum blockchain for distributed attribute-based access control in the internet of things | |
BR112016000122B1 (en) | METHOD AND SYSTEM RELATED TO USER AUTHENTICATION TO ACCESS DATA NETWORKS | |
Chandel et al. | Enterprise cloud: Its growth & security challenges in China | |
RU2415466C1 (en) | Method of controlling identification of users of information resources of heterogeneous computer network | |
AU2004203412B2 (en) | Moving principals across security boundaries without service interruption | |
CN106330836A (en) | Access control method for client by server | |
KR20120067105A (en) | Social verification login system being possible to verify user and providing method thereof | |
Saini et al. | Identity management issues in cloud computing | |
Shaikh et al. | Identity management in cloud computing | |
CN108989334A (en) | A kind of SSO single-point logging method based on JAVA | |
CN205829695U (en) | A kind of new purview certification system based on the network storage equipment | |
CN106506549A (en) | The cloud of network equipment agency shares private permission management method and system | |
US11647020B2 (en) | Satellite service for machine authentication in hybrid environments | |
Varadharajan | Design and Management of a Secure Networked Administration System: A Practical Approach | |
CN108900487B (en) | Shared net disk for implanting middleware | |
Habiba et al. | Assessment criteria for cloud identity management systems | |
Park et al. | Constructing a secure hacking-resistant IoT U-healthcare environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170315 |