CN112995803B - Method for modifying authentication information, optical network unit and passive optical network system - Google Patents

Method for modifying authentication information, optical network unit and passive optical network system Download PDF

Info

Publication number
CN112995803B
CN112995803B CN201911305445.XA CN201911305445A CN112995803B CN 112995803 B CN112995803 B CN 112995803B CN 201911305445 A CN201911305445 A CN 201911305445A CN 112995803 B CN112995803 B CN 112995803B
Authority
CN
China
Prior art keywords
optical network
network unit
authentication information
information
passive optical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911305445.XA
Other languages
Chinese (zh)
Other versions
CN112995803A (en
Inventor
陆晔
吴飞
李仁玉
汤力
易思超
张剑
张驰
高全亮
蒋宏迪
丁浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201911305445.XA priority Critical patent/CN112995803B/en
Publication of CN112995803A publication Critical patent/CN112995803A/en
Application granted granted Critical
Publication of CN112995803B publication Critical patent/CN112995803B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q11/0067Provisions for optical access or distribution networks, e.g. Gigabit Ethernet Passive Optical Network (GE-PON), ATM-based Passive Optical Network (A-PON), PON-Ring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0079Operation or maintenance aspects

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The present disclosure provides a method for modifying authentication information, an optical network unit and a passive optical network system, and relates to the technical field of communications, wherein the method comprises the following steps: responding to the modification request of the authentication information, and judging whether the authentication information exists in the optical network unit by the optical network unit; under the condition that the optical network unit has authentication information, the optical network unit checks whether a passive optical network port connected with the optical line terminal is in a normal operation state; under the condition that the passive optical network port is in a normal operation state, the optical network unit judges whether the request party of the modification request belongs to a passive optical network system where the optical network unit is located; under the condition that the requesting party belongs to the passive optical network system, the optical network unit modifies the authentication information of the optical network unit; and under the condition that the requesting party does not belong to the passive optical network system, the optical network unit does not modify the authentication information of the optical network unit.

Description

Method for modifying authentication information, optical network unit and passive optical network system
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method for modifying authentication information, an optical network unit, and a passive optical network system.
Background
In order to ensure the reliability and security of a Passive Optical Network (PON) system, before an Optical Network Unit (ONU) works normally, authentication of the ONU is required to prevent an illegal ONU from accessing the PON.
Disclosure of Invention
The inventor has noticed that, in the related art, the authentication information in the onu may be maliciously modified, so that the onu cannot pass the authentication, which affects the normal operation of the onu.
In order to solve the above problem, the embodiments of the present disclosure propose the following solutions.
According to an aspect of the embodiments of the present disclosure, a method for modifying authentication information of an optical network unit is provided, including: responding to the modification request of the authentication information, and judging whether the authentication information exists in the optical network unit by the optical network unit; under the condition that the optical network unit has authentication information, the optical network unit checks whether a passive optical network port connected with the optical line terminal is in a normal operation state; under the condition that the passive optical network port is in a normal operation state, the optical network unit judges whether the request party of the modification request belongs to a passive optical network system where the optical network unit is located; under the condition that the requesting party belongs to the passive optical network system, the optical network unit modifies the authentication information of the optical network unit; and under the condition that the requesting party does not belong to the passive optical network system, the optical network unit does not modify the authentication information of the optical network unit.
In some embodiments, the determining, by the onu, whether the requester of the modification request belongs to the passive optical network system includes: the optical network unit requires the requester to input authentication information, wherein the authentication information is information related to the optical network unit; and under the condition that the information to be verified input by the requester passes verification, judging that the requester belongs to the passive optical network system.
In some embodiments, the information related to the optical network unit includes a plurality of items of information; the authentication information is determined according to the following manner: randomly selecting one item of information from the plurality of items of information; determining at least part of the content of the randomly selected information as the authentication information.
In some embodiments, the information randomly selected by the onu is a string; the verification information is a random bit character of the string.
In some embodiments, the method for modifying authentication information of an optical network unit further includes: and under the condition that the passive optical network port is not in a normal operation state, the optical network unit directly modifies the authentication information of the optical network unit.
In some embodiments, the authentication information further comprises: the optical network unit closes the passive optical network port after modifying the authentication information of the optical network unit; the optical network unit authenticates the optical network unit according to the modified authentication information; and after the authentication is passed, the optical network unit restarts the passive optical network port.
According to another aspect of the embodiments of the present disclosure, there is provided an optical network unit including: the first judging module is configured to respond to the modification request of the authentication information and judge whether the optical network unit has the authentication information; the optical network unit comprises a checking module and a control module, wherein the checking module is configured to check whether a passive optical network port connected with an optical line terminal of the optical network unit is in a normal operation state or not under the condition that the optical network unit has authentication information; the second judging module is configured to judge whether the requester of the modification request belongs to a passive optical network system where an optical network unit is located under the condition that the passive optical network port is in a normal operation state; a processing module configured to modify authentication information of an optical network unit if the requestor belongs to the passive optical network system; and in the case that the requester does not belong to the passive optical network system, the authentication information of the optical network unit is not modified.
According to another aspect of the embodiments of the present disclosure, there is provided an optical network unit including: a memory; and a processor coupled to the memory, the processor configured to perform the method of any of the above embodiments based on instructions stored in the memory.
According to still another aspect of the embodiments of the present disclosure, a passive optical network system is provided, which includes the optical network unit of any one of the above embodiments.
According to a further aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the method of any one of the embodiments described above.
In the embodiment of the disclosure, in response to a modification request of authentication information, an optical network unit modifies the authentication information of the optical network unit only when a passive optical network port is in a normal operating state and a requester belongs to a passive optical network system, and otherwise does not modify the authentication information of the optical network unit. This reduces the risk of remote malicious modification of the authentication information of a normally operating optical network unit.
The technical solution of the present disclosure is further described in detail by the accompanying drawings and examples.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flow diagram of a method of modifying authentication information according to some embodiments of the present disclosure;
figure 2 is a schematic structural diagram of an optical network unit according to some embodiments of the present disclosure;
figure 3 is a schematic diagram of an optical network unit according to further embodiments of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
The relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
Fig. 1 is a flow diagram of a method of modifying authentication information according to some embodiments of the present disclosure.
In step 102, in response to the request for modifying the authentication information, the optical network unit determines whether the authentication information exists in the optical network unit. For example, the authentication information may be a logical identification, or a logical identification and a password.
If so, i.e. in case of the authentication information itself, step 104 is performed. If not, i.e. in case of no authentication information of itself, the optical network unit may record the modification request.
In step 104, the onu checks whether the passive optical network port connected to the olt is in a normal operation state.
If yes, namely, under the condition that the passive optical network port is in a normal operation state, executing step 106; alternatively, the passive optical network port may be closed first, and then step 106 is performed. If not, i.e. the passive optical network port is not in a normal operation state, the optical network unit directly performs step 108.
In some implementations, the optical network units may be directly connected with the optical line terminal. In other implementations, the optical network units may be indirectly connected to the optical line terminal, for example, through passive devices such as optical fibers, passive optical splitters, and the like.
As one example, whether the passive optical network port is in a normal operating state may be determined according to the operating state parameter. For example, in the case that the operation state parameter is 1, it indicates that the passive optical network port is in a normal operation state; when the operation state parameter is 0, it indicates that the passive optical network port is not in a normal operation state.
In step 106, the onu determines whether the requester of the modification request belongs to the passive optical network system in which the onu is located.
If so, namely, in the case that the requester of the modification request belongs to the passive optical network system in which the optical network unit is located, executing step 108; alternatively, the port of the passive optical network is closed first, and then step 108 is performed. If not, i.e. in case the requester of the modification request does not belong to the passive optical network system in which the optical network unit is located, step 110 is performed.
In some embodiments, the onu may determine whether the requester of the modification request belongs to the passive optical network system in which the onu is located according to the following manner: first, the onu requests the requester of the modification request to input authentication information, where the authentication information is information related to the onu. Then, under the condition that the information to be verified input by the requester passes verification, the requester is judged to belong to a passive optical network system where the optical network unit is located; and under the condition that the information to be verified input by the requester is not verified, the optical network unit judges that the requester does not belong to the passive optical network system in which the optical network unit is positioned.
In step 108, the onu modifies its authentication information.
In some embodiments, the optical network unit does not close the passive optical network port before modifying the authentication information of itself, but closes the passive optical network port after modifying the authentication information of itself. Then, the optical network unit authenticates with the modified authentication information. After the authentication is passed, the optical network unit restarts the passive optical network port to perform normal service. Such an implementation may reduce the time that normal traffic is affected.
In step 110, the onu does not modify its authentication information.
In the above embodiment, in response to the request for modifying the authentication information, the onu modifies the authentication information of the onu when the passive optical network port is in a normal operating state and the requestor belongs to the passive optical network system, or does not modify the authentication information of the onu. This reduces the risk of remote malicious modification of the authentication information of a normally operating optical network unit.
In some embodiments, the information related to the optical network unit includes a plurality of items of information, for example, WIFI information stored by the optical network unit, SSID (Service Set Identifier) of the optical network unit, and the like. In this case, it is possible to randomly select one or more pieces of information from a plurality of pieces of information and then determine a partial content of the randomly selected information as the authentication information, or determine the entire content of the randomly selected information as the authentication information. The verification mode can improve the passing difficulty of verification and reduce the possibility of error modification and malicious modification.
In some implementations, the information randomly selected by the onu may be a string, and the authentication information may be a character of a random bit of the string. For example, the information randomly selected by the optical network unit is a WIFI password. Assuming that the WIFI password is 2a3b4c5n680, the requesting party is randomly required to input part of the content of the WIFI password, for example, the first, fifth, and eighth digits of the WIFI password. If the verification information to be authenticated submitted by the requester is 24n, the verification information to be authenticated passes the verification; and if the verification information to be authenticated submitted by the requester is not 24n, the verification information to be authenticated does not pass the verification. The verification mode can further improve the verification difficulty, so that the possibility of error modification and malicious modification is further reduced.
In the present specification, the embodiments are described in a progressive manner, and each embodiment focuses on differences from other embodiments, and the same or similar parts in each embodiment are referred to each other. For the embodiment of the optical network unit, since it basically corresponds to the method embodiment, the description is relatively simple, and for relevant points, reference may be made to part of the description of the method embodiment.
Figure 2 is a schematic diagram of a structure of an optical network unit according to some embodiments of the present disclosure.
As shown in fig. 2, the optical network unit of this embodiment includes a first determining module 201, a checking module 202, a second determining module 203, and a processing module 204.
The first determining module 201 is configured to determine whether the optical network unit has the authentication information in response to the modification request of the authentication information.
The checking module 202 is configured to check whether a passive optical network port of the onu connected to the olt is in a normal operation state in case that the onu has the authentication information.
The second determining module 203 is configured to determine whether the requester of the modification request belongs to the passive optical network system where the optical network unit is located, in case that the passive optical network port is in a normal operation state.
The processing module 204 is configured to modify the authentication information of the optical network unit when the requester belongs to the passive optical network system in which the optical network unit is located; and under the condition that the requester does not belong to the passive optical network system where the optical network unit is located, the authentication information of the optical network unit is not modified.
In the above embodiment, in response to the request for modifying the authentication information, the onu modifies the authentication information of the onu when the passive optical network port is in a normal operating state and the requestor belongs to the passive optical network system, or does not modify the authentication information of the onu. This reduces the risk of remote malicious modification of the authentication information of a normally operating optical network unit.
Figure 3 is a schematic diagram of an optical network unit according to further embodiments of the present disclosure.
As shown in fig. 3, the optical network unit 300 of this embodiment includes a memory 301 and a processor 302 coupled to the memory 301, and the processor 302 is configured to execute the method of any one of the foregoing embodiments based on instructions stored in the memory 301.
The memory 301 may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory may store, for example, an operating system, application programs, a Boot Loader (Boot Loader), and other programs.
The optical network unit 300 may further include an input-output interface 303, a network interface 304, a storage interface 305, and the like. The interfaces 303, 304, 305 and the memory 301 and the processor 302 may be connected by a bus 306, for example. The input/output interface 303 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 304 provides a connection interface for various networking devices. The storage interface 305 provides a connection interface for external storage devices such as an SD card and a usb disk.
The embodiment of the present disclosure further provides a passive optical network system, including the optical network unit according to any one of the above embodiments. The passive optical network system may further comprise an optical line terminal or the like. For example, the Passive Optical Network system may be an Ethernet Passive Optical Network (EPON). Because the authentication information of the optical network unit can not be maliciously modified, the reliability and the safety of the passive optical network system can be improved.
The disclosed embodiments also provide a computer-readable storage medium, on which computer program instructions are stored, which when executed by a processor implement the method of any one of the above embodiments.
Thus far, various embodiments of the present disclosure have been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that the functions specified in one or more of the flows in the flowcharts and/or one or more of the blocks in the block diagrams can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. It will be understood by those skilled in the art that various changes may be made in the above embodiments or equivalents may be substituted for elements thereof without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (9)

1. A method for modifying authentication information comprises the following steps:
responding to the modification request of the authentication information, and judging whether the authentication information exists in the optical network unit by the optical network unit;
under the condition that the optical network unit has authentication information, the optical network unit checks whether a passive optical network port connected with the optical line terminal is in a normal operation state;
under the condition that the passive optical network port is in a normal operation state, the optical network unit judges whether the request party of the modification request belongs to a passive optical network system where the optical network unit is located, and the method comprises the following steps: the optical network unit requires the requester to input authentication information, wherein the authentication information is information related to the optical network unit; under the condition that the information to be verified input by the requester passes verification, judging that the requester belongs to the passive optical network system;
under the condition that the requesting party belongs to the passive optical network system, the optical network unit modifies the authentication information of the optical network unit;
and under the condition that the requesting party does not belong to the passive optical network system, the optical network unit does not modify the authentication information of the optical network unit.
2. The method of claim 1, wherein the information related to the optical network unit comprises a plurality of items of information;
the authentication information is determined according to the following manner:
randomly selecting one item of information from the plurality of items of information;
determining at least a part of the content of the randomly selected information as the authentication information.
3. The method of claim 2, wherein the information randomly selected by the onu is a string;
the verification information is a random bit character of the string.
4. The method of claim 1, further comprising:
and under the condition that the passive optical network port is not in a normal operation state, the optical network unit directly modifies the authentication information of the optical network unit.
5. The method of claim 1, further comprising:
the optical network unit closes the passive optical network port after modifying the authentication information of the optical network unit;
the optical network unit authenticates the optical network unit according to the modified authentication information;
and after the authentication is passed, the optical network unit restarts the passive optical network port.
6. An optical network unit comprising:
the first judging module is configured to respond to the modification request of the authentication information and judge whether the optical network unit has the authentication information;
the optical network unit comprises a checking module and a control module, wherein the checking module is configured to check whether a passive optical network port connected with an optical line terminal of the optical network unit is in a normal operation state or not under the condition that the optical network unit has authentication information;
the second judging module is configured to judge whether the requester of the modification request belongs to a passive optical network system where an optical network unit is located under the condition that the passive optical network port is in a normal operation state;
a processing module configured to modify authentication information of an optical network unit if the supplicant belongs to the passive optical network system; under the condition that the requester does not belong to the passive optical network system, the authentication information of the optical network unit is not modified;
the second judging module is configured to require the requester to input authentication information, wherein the authentication information is information related to an optical network unit; and under the condition that the information to be verified input by the requester passes verification, judging that the requester belongs to the passive optical network system.
7. An optical network unit comprising:
a memory;
a processor coupled to the memory, the processor configured to perform the method of any of claims 1-5 based on instructions stored in the memory.
8. A passive optical network system, comprising: an optical network unit as claimed in claim 6 or 7.
9. A computer readable storage medium having computer program instructions stored thereon, wherein the instructions, when executed by a processor, implement the method of any of claims 1-5.
CN201911305445.XA 2019-12-18 2019-12-18 Method for modifying authentication information, optical network unit and passive optical network system Active CN112995803B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911305445.XA CN112995803B (en) 2019-12-18 2019-12-18 Method for modifying authentication information, optical network unit and passive optical network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911305445.XA CN112995803B (en) 2019-12-18 2019-12-18 Method for modifying authentication information, optical network unit and passive optical network system

Publications (2)

Publication Number Publication Date
CN112995803A CN112995803A (en) 2021-06-18
CN112995803B true CN112995803B (en) 2022-06-07

Family

ID=76343618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911305445.XA Active CN112995803B (en) 2019-12-18 2019-12-18 Method for modifying authentication information, optical network unit and passive optical network system

Country Status (1)

Country Link
CN (1) CN112995803B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100675836B1 (en) * 2004-12-10 2007-01-29 한국전자통신연구원 Authentication method for a link protection in EPON
CN100471117C (en) * 2006-04-05 2009-03-18 迈世亚(北京)科技有限公司 Data automatic updating method
CN1845119A (en) * 2006-04-16 2006-10-11 许先才 Storage and management of authentication information and method and system for proxy authentication
EP2924913A4 (en) * 2012-12-28 2015-11-25 Huawei Tech Co Ltd Authentication method, device and system
MY184439A (en) * 2013-08-22 2021-04-01 Huawei Tech Co Ltd Terminal authentication method, apparatus, and system in passive optical network
CN110011978B (en) * 2019-03-08 2021-02-12 创新先进技术有限公司 Method, system, device and computer equipment for modifying block chain network configuration

Also Published As

Publication number Publication date
CN112995803A (en) 2021-06-18

Similar Documents

Publication Publication Date Title
CN109889503B (en) Identity management method based on block chain, electronic device and storage medium
US20090193211A1 (en) Software authentication for computer systems
KR101756692B1 (en) Terminal Device for Dynamic Secure Module and Driving Method Thereof
CN111818088A (en) Authorization mode management method and device, computer equipment and readable storage medium
US9972006B2 (en) Method for secure execution of entrusted management command
CN112464212A (en) Data authority control reconstruction method based on mature complex service system
CN107454041B (en) Method and device for preventing server from being attacked
KR102213460B1 (en) System and method for generating software whistlist using machine run
CN105282166A (en) Identity authentication method and system for linux operating system
CN109213572B (en) Credibility determination method based on virtual machine and server
CN114500039A (en) Instruction issuing method and system based on safety control
CN111581616B (en) Multi-terminal login control method and device
CN111143808B (en) System security authentication method and device, computing equipment and storage medium
CN112995803B (en) Method for modifying authentication information, optical network unit and passive optical network system
CN112464213A (en) Operating system access control method, device, equipment and storage medium
CN106937282B (en) VPN access method and system based on mobile terminal
CN107864146A (en) A kind of safe cloud storage system
CN110730063B (en) Security verification method and system, internet of things platform, terminal and readable storage medium
CN109428869B (en) Phishing attack defense method and authorization server
CN112751807B (en) Secure communication method, device, system and storage medium
CN114978677A (en) Asset access control method, device, electronic equipment and computer readable medium
KR102201218B1 (en) Access control system and method to security engine of mobile terminal
CN102739690B (en) Safety data exchange process monitoring method and system
EP3776319A1 (en) Access control
CN111310131B (en) so library call processing method and device, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant