CN106549976A - A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system - Google Patents
A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system Download PDFInfo
- Publication number
- CN106549976A CN106549976A CN201611130519.7A CN201611130519A CN106549976A CN 106549976 A CN106549976 A CN 106549976A CN 201611130519 A CN201611130519 A CN 201611130519A CN 106549976 A CN106549976 A CN 106549976A
- Authority
- CN
- China
- Prior art keywords
- user
- client
- operating system
- server
- computing system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system, the authentication method is included when user's start is logged in, client sends landing request information to certificate server, certificate server inquires about background data base, obtains the bootable operating system permissions list of user and is sent to client;User's selection operation system, initiates remote loading request to storage server;Storage server is authenticated to the username and password of client, and the configuration file of operating system of user mirror image is checked in certification after passing through, and the IP according to client is arranged with the IP of the operating system mirror image that will start and judged certification success or not.The ' In System Reconfiguration Method is used for transparent computing system of the configuration using the method for authenticating user identity.Present invention achieves the rights management of user, some personalized services can be provided, perfect Consumer's Experience.
Description
Technical field
The present invention relates to transparent computing system field, more particularly to suitable for the authenticating user identification side of transparent computing system
The collocation method of method and the transparent computing system using the method for authenticating user identity.
Background technology
Lucidification disposal is that a kind of user need not perceive computer operating system, middleware, application program and communication network
It is concrete to be located, only need to be according to the demand of oneself, by network from required various clients(Including fixation, movement, Yi Jijia
All kinds of clients in front yard)Middle selection simultaneously uses respective service(Such as calculating, phone, TV, online and amusement etc.)Calculating
Pattern.The feature of transparent computing system mainly have it is following some:
Ith, storage is separated with calculating.Transparent computing system is divided into two parts of client and server, the visitor that wherein user uses
Family end is stored in server without the need for installing any operating system and application software, the unification of all software resources in advance.When with
When family accesses lucidification disposal server, on-demand loading software resource, and be performed locally and calculating.
IIth, the support of cross-terminal, spanning operation system platform.User can access lucidification disposal server in any terminal
Service needed for obtaining, and selection operation system platform as needed.For client, need not or try one's best before use
The installation to client and configuration are reduced, to improve user experience.
IIIth, using stream block formula transmission instruction and data between client and server.Client is in remote loading operation system
During system, it is not necessary to by whole operation system downloads to local runtime, but it is identical that the data of server storage are divided into size
Data block, client only downloads the data block of required part, and all data blocks are transmitted in the form of data flow.
But, there is following shortcoming in the authentication of current lucidification disposal:
(1)Traditional static password identity identifying technology, distinguishes that only by user name, password user has not been suitable for new
Transparent Calculation Model.Operating system is supplied to user by lucidification disposal, and is responsible for storage program area mirror image
Storage server and the certificate server of responsible user authority management be separated from each other, the simple checking first cannot ensure
Secure user data, disabled user is if it is known that operating system mirror image address, then can just get around certificate server, directly
Start the operating system mirror image of storage server, cause the safety problems such as user data leakage.
(2)The new identity identifying technology such as short message password, dynamic password needs to assist to complete by third party, adopts
The personal information of user will certainly be shared with third party by this mode, and this is not that user is ready what is seen.
(3)Lucidification disposal plays more and more important effect in fields such as medical treatment, education, and these fields have one altogether
Same feature:Intranet is all to distribute IP address in static IP mode, and static allocation IP mode exists compared to dynamic access IP advantage
Will not conflict in Intranet user IP, break down easily positioning, have special network manager to be responsible for IP management.And lucidification disposal
System still adopts dynamic access IP mode at present, in terminal use's running example operating system, it is impossible to distinguish user in real time
Identity, is unfavorable for the positioning of failure and excludes.
The content of the invention
Present invention aim at providing a kind of method for authenticating user identity suitable for transparent computing system uses the user
The collocation method of the transparent computing system of identity identifying method, easily causes use with the single capacity certification for solving current lucidification disposal
User data is revealed, needs third party to assist and cannot distinguish in real time the technical problem of user identity.
For achieving the above object, the invention provides a kind of method for authenticating user identity suitable for transparent computing system,
Including when user's start is logged in, following authenticating step is performed:
S1:Client obtains IP, configuration file static allocation IP that Dynamic Host Configuration Protocol server is bound according to MAC and IP in a static manner;
S2:Client sends landing request information to certificate server, and landing request information includes address of the authentication server, user
Name and password;
S3:Certificate server inquires about background data base, obtains the bootable operating system permissions list of user and writes text envelope
Breath is sent to client, and text message includes ID, operating system quantity and OS name;
S4:User selects to want the operating system of remote loading by client, initiates remote loading request to storage server,
Load request packet contains user name, password, storage server address and remote operating system mirror image unique mark;
S5:Storage server is authenticated to the username and password from the client for initiating remote loading request, and certification is led to
Later check the configuration file of operating system of user mirror image, and confirm the IP of client whether with the operating system mirror that will start
The IP of picture arranges consistent, such as consistent, then judge authenticating user identification success.
As the further improvement of the method for authenticating user identity of the present invention:
In step S2 and S3, client is communicated using http agreements with certificate server;In step S4 and S5, client with
Storage server is communicated using iSCSI protocol.
As a total technology design, present invention also offers it is a kind of using above-mentioned suitable for transparent computing system
The ' In System Reconfiguration Method of the transparent computing system of method for authenticating user identity, comprises the following steps:
1)Add network configuration, authenticating user identification pol-icy code in network boot NBP source code, and recompilate generation
NBP bootstrap;
2)The main boot subregion MBR under BIOS patterns on the hard disk of erasing client, the NBP bootstrap generated with compiling are replaced
Change former main boot subregion MBR;
3)The MySQL and Tomcat service of configuration certificate server, and authentication background program is deployed on Tomcat;
4)The iSCSI service of configuration storage server, by operating system of user mirror image and user name and cryptographic binding, modification operation
The access rights of system image, and the IP address being able to access that is set;
5)The configuration file of modification Dynamic Host Configuration Protocol server, distributes IP, in a static manner by the client using transparent computing system
Physical address is bound with IP;
6)The operating system of user mirror image of remote loading is made, the network profile of each operating system nucleus is changed, will system
The position that the operating system mirrored storage for performing is specified in iSCSI configuration files.
The invention has the advantages that:
1st, the method for authenticating user identity suitable for transparent computing system of the invention, by subscription client MAC Address, IP address
And user identity combines, user need to carry out multiple certification, certification to certificate server and storage server when obtaining service
Server is responsible for the rights management of user, and storage server is not only responsible for operating system of user mirrored storage, also based on user's body
Part certification and user identity is authenticated based on IP address authorization two ways.Enhance the safe and reliable of transparent computing system
Property, to the corporate intranet user such as hospital, school, when client operation operating system breaks down, investigation is more easy to positioning.This
Outward, the rights management of user is realized by transparent computing system Web authentication server, system not only can be provided for all users
One service, additionally it is possible to provide some personalized services for the user of different rights, such as each user have it is different can
Operating system list of startup etc., perfect Consumer's Experience.
2nd, the ' In System Reconfiguration Method of the transparent computing system of the aforementioned method for authenticating user identity of use of the invention, configuration letter
Singly it is easily achieved;User authentication policy module, reduces transplanting difficulty, expands the scope of application.
In addition to objects, features and advantages described above, the present invention also has other objects, features and advantages.
Below with reference to accompanying drawings, the present invention is further detailed explanation.
Description of the drawings
The accompanying drawing for constituting the part of the application is used for providing a further understanding of the present invention, the schematic reality of the present invention
Apply example and its illustrate, for explaining the present invention, not constituting inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the overall structure block diagram of the transparent computing system of the preferred embodiment of the present invention 1;
Fig. 2 is the schematic flow sheet of the method for authenticating user identity suitable for transparent computing system of the preferred embodiment of the present invention 1;
Fig. 3 is that the data form of the landing request information that the client of the preferred embodiment of the present invention 1 is sent to certificate server is shown
It is intended to;
Fig. 4 is the data form schematic diagram of the text message of the authentication server response client of the preferred embodiment of the present invention 1;
Fig. 5 is the schematic flow sheet of the method for authenticating user identity suitable for transparent computing system of the preferred embodiment of the present invention 2;
Fig. 6 is the system of the transparent computing system of the method for authenticating user identity using the present invention of the preferred embodiment of the present invention 3
The flow chart of collocation method.
Specific embodiment
Embodiments of the invention are described in detail below in conjunction with accompanying drawing, but the present invention can be defined by the claims
Implement with the multitude of different ways for covering.
Embodiment 1:
Fig. 1 shows the overall structure block diagram of the transparent computing system of the present embodiment, and client hardware platform is the shifting of x86 frameworks
Dynamic flat board, good network boot NBP of the advance burning of its hard disk(According to the network boot that open source projects are write);Server
End includes two parts:The certificate server of responsible user right information management(That is Web authentication server)With responsible user operation
The storage server of system image storage.Storage server need to configure iSCSI service, DHCP service, and Web authentication server need to be matched somebody with somebody
Put MySQL services, Tomcat services(Referring to embodiment 3).
Referring to Fig. 2, the method for authenticating user identity suitable for transparent computing system of the present embodiment, comprise the following steps:
S201:Establish machine login in client by cable, carry out network configuration first, obtain IP address, Dynamic Host Configuration Protocol server in a static manner
According to configuration file static allocation IP that MAC and IP binds.
S202:Client sends landing request information to certificate server, and terminal bootstrap is by Web authentication server
URL addresses, username and password information composition(The data form of landing request information is as shown in Figure 3)Landing request information,
Web authentication server is sent to by http agreements to be authenticated.
S203:Web authentication server is according to the client user's name and encrypted message inquiry backstage MySQL data for receiving
Storehouse, obtains the operating system permissions list of user.
S204:Web authentication serve end program will be comprising user right information(Have which operating system is available for user long-range
Loading)Query Result write into text message according to the data form shown in Fig. 4, text information includes ID
(Access fields), operating system quantity(Count fields), OS name(OS_name fields)And end mark(Flag words
Section), and client is sent to by http agreements.
S205:Client searches the text data of Web authentication server return in internal memory, and parses ID
(Access fields), operating system quantity(Count fields), OS name(OS_name fields)Etc. user right information.
S206:By user right information(I.e. alternative operating system list)It is presented on client screen and supplies user
Select, according to the operating system that user selects to start, remote loading request, i.e. client are initiated to storage clothes to storage server
Business device sends load request information, and load request packet contains user name, password, storage server address and remote operating system
Mirror image unique mark.Certificate server is responsible for the rights management of user(Which has with the presence or absence of the user, the user in data base
Operating system is available for remote loading), storage server also provided use in configuration file for each operating system mirror image
Name in an account book password, for storage server end group in user's checking.In this step, regardless of whether there is the user all to need to carry out once
Feedback.ID determines that the user whether there is, and non-existent user can not carry out subsequent authentication.There is user at least
There is a system available, the title of the system can feed back to client and show.
S207:Storage server is authenticated to the username and password for initiating the client of remote loading request.
S208:The request that storage server passes through to username and password certification, queried access competence profile, checking
Whether the client ip address for initiating request is allowed to load the operating system mirror image.
S209:IP address certification passes through, terminal on-demand loading remote operating system to local runtime, and data are passed with flowing block formula
It is defeated.
Using static allocation IP, MAC and IP can be bound by Dynamic Host Configuration Protocol server, and storage server is close with user name is provided with
Code and IP are limited, and together, client request Dynamic Host Configuration Protocol server static allocation IP is asked with MAC Address to three's indirect association
, so the configuration file of storage server is consistent with Dynamic Host Configuration Protocol server configuration file.Client has user name password, MAC
There are MAC Address, IP address in address, Dynamic Host Configuration Protocol server, and storage server has user name password, IP address, and this three parts configuration is needed
Unanimously, cannot otherwise authenticate successfully.Because MAC and IP binding be DHCP provide static allocation mode, the present invention mainly in combination with
IP mandates, and then MAC is incorporated.
Embodiment 2:
Referring to Fig. 5, the method for authenticating user identity suitable for transparent computing system of the present embodiment, comprise the following steps:
When user's start is logged in, following authenticating step is performed:
S1:Client sends landing request information bag to certificate server, the landing request information(Referring to Fig. 3)Including certification
Server address, username and password.
S2:Certificate server inquires about background data base, obtains the bootable operating system permissions list of the user and writes
Enter text message and be sent to client, the text message(Referring to Fig. 4)Including ID, operating system quantity, operation system
System title and end mark.
S3:User selects to want the operating system of remote loading by client, initiates remote loading to storage server
Request, load request packet contain user name, password, storage server address and remote operating system mirror image unique mark.
S4:Storage server is authenticated to the username and password from the client for initiating remote loading request, is recognized
Card checks the configuration file of operating system of user mirror image after passing through, and confirm the IP of client whether with the operation system that will start
The IP of system mirror image arranges consistent, such as consistent, then judge authenticating user identification success.
After authenticating user identification success, remote loading operating system image instance to client runs, juxtaposition active user
For presence.
To sum up, the method for authenticating user identity suitable for transparent computing system of the invention, no longer merely uses user
Name password, but by operating system of user mirror image and user using the IP address of client bind together, divided using static
With IP modes, only could remote loading operating system mirror in the case of IP address, MAC Address and user name password are all correct
As example is to local runtime, the security reliability of transparent computing system is enhanced, to the corporate intranet user such as hospital, school, visitor
When family end operation operating system breaks down, investigation is more easy to positioning.
Additionally, the rights management of user is realized by transparent computing system Web authentication server, not only can be all
User provides unified service, additionally it is possible to provide some personalized services for the user of different rights, such as each user
There are different bootable operating system lists etc., perfect Consumer's Experience.
Embodiment 3:
Referring to Fig. 6, using embodiment 1 or the system configuration side of the transparent computing system of the method for authenticating user identity of embodiment 2
Method, comprises the following steps:
1)Add network configuration and authenticating user identification pol-icy code in bootstrap NBP source code, and recompilate generation NBP
Bootstrap;
2)The main boot subregion MBR under BIOS patterns on the hard disk of erasing client, the NBP bootstrap that compiling is generated burn
It is written to former main boot subregion MBR positions;
3)The MySQL and Tomcat service of configuration certificate server, and authentication background program is deployed in into web authentication service
On the Tomcat of device;
4)The iSCSI service of configuration storage server, by operating system of user mirror image and user name and cryptographic binding, modification operation
The access rights of system image, and the IP address being able to access that is set;
5)The configuration file of modification Dynamic Host Configuration Protocol server, distributes IP, in a static manner by the client using transparent computing system
Physical address is bound with IP;
6)The operating system of user mirror image of remote loading is made, the network profile of each operating system nucleus is changed, will system
Specified location of the operating system mirrored storage for performing in iSCSI configuration files.
Above-mentioned ' In System Reconfiguration Method, configuration are simply easily achieved;By user authentication policy module, transplanting is reduced difficult
Degree, expands the scope of application.
The preferred embodiments of the present invention are the foregoing is only, the present invention is not limited to, for the skill of this area
For art personnel, the present invention can have various modifications and variations.It is all within the spirit and principles in the present invention, made any repair
Change, equivalent, improvement etc., should be included within the scope of the present invention.
Claims (3)
1. a kind of method for authenticating user identity suitable for transparent computing system, it is characterised in that include logging in when user's start
When, perform following authenticating step:
S1:Client obtains IP, configuration file static allocation IP that Dynamic Host Configuration Protocol server is bound according to MAC and IP in a static manner;
S2:Client send landing request information to certificate server, the landing request information include address of the authentication server,
Username and password;
S3:Certificate server inquires about background data base, obtains the bootable operating system permissions list of the user and writes text
This information is sent to client, and the text message includes ID, operating system quantity and OS name;
S4:User selects to want the operating system of remote loading by client, initiates remote loading request to storage server,
The load request packet contains user name, password, storage server address and remote operating system mirror image unique mark;
S5:Storage server is authenticated to the username and password from the client for initiating remote loading request, and certification is led to
Later check the configuration file of operating system of user mirror image, and confirm the IP of client whether with the operating system mirror that will start
The IP of picture arranges consistent, such as consistent, then judge authenticating user identification success.
2. the method for authenticating user identity suitable for transparent computing system according to claim 1, it is characterised in that described
In step S2 and S3, the client is communicated using http agreements with the certificate server;In step S4 and S5,
The client is communicated using iSCSI protocol with the storage server.
3. a kind of using the transparent of the method for authenticating user identity for being applied to transparent computing system as claimed in claim 1 or 2
The ' In System Reconfiguration Method of computing system, it is characterised in that comprise the following steps:
1)Add network configuration, authenticating user identification pol-icy code in network boot NBP source code, and recompilate generation
NBP bootstrap;
2)The main boot subregion MBR under BIOS patterns on the hard disk of erasing client, the NBP bootstrap generated with compiling are replaced
Change former main boot subregion MBR;
3)The MySQL and Tomcat service of configuration certificate server, and authentication background program is deployed on Tomcat;
4)The iSCSI service of configuration storage server, by operating system of user mirror image and user name and cryptographic binding, modification operation
The access rights of system image, and the IP address being able to access that is set;
5)The configuration file of modification Dynamic Host Configuration Protocol server, distributes IP, in a static manner by the client using transparent computing system
Physical address is bound with IP;
6)The operating system of user mirror image of remote loading is made, the network profile of each operating system nucleus is changed, will system
The position that the operating system mirrored storage for performing is specified in iSCSI configuration files.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611130519.7A CN106549976B (en) | 2016-12-09 | 2016-12-09 | A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611130519.7A CN106549976B (en) | 2016-12-09 | 2016-12-09 | A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106549976A true CN106549976A (en) | 2017-03-29 |
CN106549976B CN106549976B (en) | 2019-11-12 |
Family
ID=58397200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611130519.7A Active CN106549976B (en) | 2016-12-09 | 2016-12-09 | A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106549976B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107197373A (en) * | 2017-06-06 | 2017-09-22 | 深圳前海茂佳软件科技有限公司 | TV access right management method, TV and computer-readable recording medium |
CN107528918A (en) * | 2017-09-15 | 2017-12-29 | 湖南新云网科技有限公司 | Application program for mobile terminal management method and system based on lucidification disposal |
CN107707656A (en) * | 2017-10-10 | 2018-02-16 | 李梓彤 | The remote loading method and system of operating system |
CN110032414A (en) * | 2019-03-06 | 2019-07-19 | 联想企业解决方案(新加坡)有限公司 | Apparatus and method for secure user authentication in remote console mode |
CN111291429A (en) * | 2020-01-21 | 2020-06-16 | 李岗 | Data protection method and system |
CN115469878A (en) * | 2022-09-13 | 2022-12-13 | 上海掌御信息科技有限公司 | Android code diversity compiling method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1670698A (en) * | 2005-04-06 | 2005-09-21 | 清华大学 | Transparent computing based computing apparatus and method |
CN102610012A (en) * | 2012-02-14 | 2012-07-25 | 中国民航信息网络股份有限公司 | Common platform system and method of electronic boarding card |
CN102664958A (en) * | 2012-04-27 | 2012-09-12 | 中山大学 | Transparent computing system |
CN104166586A (en) * | 2014-09-04 | 2014-11-26 | 中南大学 | Transparent computing method and transparent computing system based on virtualization technology |
CN104363207A (en) * | 2014-10-29 | 2015-02-18 | 北京成众志科技有限公司 | Multi-factor security enhancement authorization and authentication method |
-
2016
- 2016-12-09 CN CN201611130519.7A patent/CN106549976B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1670698A (en) * | 2005-04-06 | 2005-09-21 | 清华大学 | Transparent computing based computing apparatus and method |
CN102610012A (en) * | 2012-02-14 | 2012-07-25 | 中国民航信息网络股份有限公司 | Common platform system and method of electronic boarding card |
CN102664958A (en) * | 2012-04-27 | 2012-09-12 | 中山大学 | Transparent computing system |
CN104166586A (en) * | 2014-09-04 | 2014-11-26 | 中南大学 | Transparent computing method and transparent computing system based on virtualization technology |
CN104363207A (en) * | 2014-10-29 | 2015-02-18 | 北京成众志科技有限公司 | Multi-factor security enhancement authorization and authentication method |
Non-Patent Citations (2)
Title |
---|
刘新向: "利用DHCP服务器分配静态IP地址", 《洛阳师范学院学报》 * |
周悦芝: "一种用于网络计算的可定制启动协议", 《软件学报》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107197373A (en) * | 2017-06-06 | 2017-09-22 | 深圳前海茂佳软件科技有限公司 | TV access right management method, TV and computer-readable recording medium |
CN107528918A (en) * | 2017-09-15 | 2017-12-29 | 湖南新云网科技有限公司 | Application program for mobile terminal management method and system based on lucidification disposal |
CN107707656A (en) * | 2017-10-10 | 2018-02-16 | 李梓彤 | The remote loading method and system of operating system |
CN110032414A (en) * | 2019-03-06 | 2019-07-19 | 联想企业解决方案(新加坡)有限公司 | Apparatus and method for secure user authentication in remote console mode |
CN110032414B (en) * | 2019-03-06 | 2023-06-06 | 联想企业解决方案(新加坡)有限公司 | Apparatus and method for secure user authentication in remote console mode |
CN111291429A (en) * | 2020-01-21 | 2020-06-16 | 李岗 | Data protection method and system |
CN115469878A (en) * | 2022-09-13 | 2022-12-13 | 上海掌御信息科技有限公司 | Android code diversity compiling method |
CN115469878B (en) * | 2022-09-13 | 2023-11-24 | 上海掌御信息科技有限公司 | Android code diversity compiling method |
Also Published As
Publication number | Publication date |
---|---|
CN106549976B (en) | 2019-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106549976A (en) | A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system | |
US10686655B2 (en) | Proximity and context aware mobile workspaces in enterprise systems | |
JP6782307B2 (en) | Dynamic access to hosted applications | |
US10447684B2 (en) | Hosted application sandbox model | |
US8370905B2 (en) | Domain access system | |
US10331882B2 (en) | Tracking and managing virtual desktops using signed tokens | |
CN106411857B (en) | A kind of private clound GIS service access control method based on virtual isolation mech isolation test | |
US20180026984A1 (en) | Access authentication for cloud-based shared content | |
US9154504B2 (en) | Device apparatus, control method, and relating storage medium | |
US9380062B2 (en) | Techniques for sharing virtual machine (VM) resources | |
US20050120199A1 (en) | Distributed dynamic security for document collaboration | |
KR101886946B1 (en) | Relay proxy providing secure connectivity in a controlled network environment | |
US20150200928A1 (en) | Techniques for secure access management in virtual environments | |
CN105379223A (en) | Validating the identity of a mobile application for mobile application management | |
CN102404314A (en) | Remote resources single-point sign on | |
US20140150055A1 (en) | Data reference system and application authentication method | |
CN101540757A (en) | Method and system for identifying network and identification equipment | |
US20210203654A1 (en) | Local Mapped Accounts in Virtual Desktops | |
CN104348895A (en) | Method and device for sharing data among programs in mobile terminal | |
EP3685265A1 (en) | Geographic location based computing asset provisioning in distributed computing systems | |
CN111108736A (en) | Automatic address failover for receivers and browsers using cloud services | |
WO2013137842A1 (en) | A system and method for accessing a service | |
US9043935B2 (en) | Techniques for personalizing content | |
CN105814834B (en) | Push-based trust model for public cloud applications | |
CN112560006A (en) | Single sign-on method and system under multi-application system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |