CN106549976A - A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system - Google Patents

A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system Download PDF

Info

Publication number
CN106549976A
CN106549976A CN201611130519.7A CN201611130519A CN106549976A CN 106549976 A CN106549976 A CN 106549976A CN 201611130519 A CN201611130519 A CN 201611130519A CN 106549976 A CN106549976 A CN 106549976A
Authority
CN
China
Prior art keywords
user
client
operating system
server
computing system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611130519.7A
Other languages
Chinese (zh)
Other versions
CN106549976B (en
Inventor
郑瑾
李俊
张尧学
胡小龙
张祖平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN201611130519.7A priority Critical patent/CN106549976B/en
Publication of CN106549976A publication Critical patent/CN106549976A/en
Application granted granted Critical
Publication of CN106549976B publication Critical patent/CN106549976B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system, the authentication method is included when user's start is logged in, client sends landing request information to certificate server, certificate server inquires about background data base, obtains the bootable operating system permissions list of user and is sent to client;User's selection operation system, initiates remote loading request to storage server;Storage server is authenticated to the username and password of client, and the configuration file of operating system of user mirror image is checked in certification after passing through, and the IP according to client is arranged with the IP of the operating system mirror image that will start and judged certification success or not.The ' In System Reconfiguration Method is used for transparent computing system of the configuration using the method for authenticating user identity.Present invention achieves the rights management of user, some personalized services can be provided, perfect Consumer's Experience.

Description

A kind of method for authenticating user identity and system configuration suitable for transparent computing system Method
Technical field
The present invention relates to transparent computing system field, more particularly to suitable for the authenticating user identification side of transparent computing system The collocation method of method and the transparent computing system using the method for authenticating user identity.
Background technology
Lucidification disposal is that a kind of user need not perceive computer operating system, middleware, application program and communication network It is concrete to be located, only need to be according to the demand of oneself, by network from required various clients(Including fixation, movement, Yi Jijia All kinds of clients in front yard)Middle selection simultaneously uses respective service(Such as calculating, phone, TV, online and amusement etc.)Calculating Pattern.The feature of transparent computing system mainly have it is following some:
Ith, storage is separated with calculating.Transparent computing system is divided into two parts of client and server, the visitor that wherein user uses Family end is stored in server without the need for installing any operating system and application software, the unification of all software resources in advance.When with When family accesses lucidification disposal server, on-demand loading software resource, and be performed locally and calculating.
IIth, the support of cross-terminal, spanning operation system platform.User can access lucidification disposal server in any terminal Service needed for obtaining, and selection operation system platform as needed.For client, need not or try one's best before use The installation to client and configuration are reduced, to improve user experience.
IIIth, using stream block formula transmission instruction and data between client and server.Client is in remote loading operation system During system, it is not necessary to by whole operation system downloads to local runtime, but it is identical that the data of server storage are divided into size Data block, client only downloads the data block of required part, and all data blocks are transmitted in the form of data flow.
But, there is following shortcoming in the authentication of current lucidification disposal:
(1)Traditional static password identity identifying technology, distinguishes that only by user name, password user has not been suitable for new Transparent Calculation Model.Operating system is supplied to user by lucidification disposal, and is responsible for storage program area mirror image Storage server and the certificate server of responsible user authority management be separated from each other, the simple checking first cannot ensure Secure user data, disabled user is if it is known that operating system mirror image address, then can just get around certificate server, directly Start the operating system mirror image of storage server, cause the safety problems such as user data leakage.
(2)The new identity identifying technology such as short message password, dynamic password needs to assist to complete by third party, adopts The personal information of user will certainly be shared with third party by this mode, and this is not that user is ready what is seen.
(3)Lucidification disposal plays more and more important effect in fields such as medical treatment, education, and these fields have one altogether Same feature:Intranet is all to distribute IP address in static IP mode, and static allocation IP mode exists compared to dynamic access IP advantage Will not conflict in Intranet user IP, break down easily positioning, have special network manager to be responsible for IP management.And lucidification disposal System still adopts dynamic access IP mode at present, in terminal use's running example operating system, it is impossible to distinguish user in real time Identity, is unfavorable for the positioning of failure and excludes.
The content of the invention
Present invention aim at providing a kind of method for authenticating user identity suitable for transparent computing system uses the user The collocation method of the transparent computing system of identity identifying method, easily causes use with the single capacity certification for solving current lucidification disposal User data is revealed, needs third party to assist and cannot distinguish in real time the technical problem of user identity.
For achieving the above object, the invention provides a kind of method for authenticating user identity suitable for transparent computing system, Including when user's start is logged in, following authenticating step is performed:
S1:Client obtains IP, configuration file static allocation IP that Dynamic Host Configuration Protocol server is bound according to MAC and IP in a static manner;
S2:Client sends landing request information to certificate server, and landing request information includes address of the authentication server, user Name and password;
S3:Certificate server inquires about background data base, obtains the bootable operating system permissions list of user and writes text envelope Breath is sent to client, and text message includes ID, operating system quantity and OS name;
S4:User selects to want the operating system of remote loading by client, initiates remote loading request to storage server, Load request packet contains user name, password, storage server address and remote operating system mirror image unique mark;
S5:Storage server is authenticated to the username and password from the client for initiating remote loading request, and certification is led to Later check the configuration file of operating system of user mirror image, and confirm the IP of client whether with the operating system mirror that will start The IP of picture arranges consistent, such as consistent, then judge authenticating user identification success.
As the further improvement of the method for authenticating user identity of the present invention:
In step S2 and S3, client is communicated using http agreements with certificate server;In step S4 and S5, client with Storage server is communicated using iSCSI protocol.
As a total technology design, present invention also offers it is a kind of using above-mentioned suitable for transparent computing system The ' In System Reconfiguration Method of the transparent computing system of method for authenticating user identity, comprises the following steps:
1)Add network configuration, authenticating user identification pol-icy code in network boot NBP source code, and recompilate generation NBP bootstrap;
2)The main boot subregion MBR under BIOS patterns on the hard disk of erasing client, the NBP bootstrap generated with compiling are replaced Change former main boot subregion MBR;
3)The MySQL and Tomcat service of configuration certificate server, and authentication background program is deployed on Tomcat;
4)The iSCSI service of configuration storage server, by operating system of user mirror image and user name and cryptographic binding, modification operation The access rights of system image, and the IP address being able to access that is set;
5)The configuration file of modification Dynamic Host Configuration Protocol server, distributes IP, in a static manner by the client using transparent computing system Physical address is bound with IP;
6)The operating system of user mirror image of remote loading is made, the network profile of each operating system nucleus is changed, will system The position that the operating system mirrored storage for performing is specified in iSCSI configuration files.
The invention has the advantages that:
1st, the method for authenticating user identity suitable for transparent computing system of the invention, by subscription client MAC Address, IP address And user identity combines, user need to carry out multiple certification, certification to certificate server and storage server when obtaining service Server is responsible for the rights management of user, and storage server is not only responsible for operating system of user mirrored storage, also based on user's body Part certification and user identity is authenticated based on IP address authorization two ways.Enhance the safe and reliable of transparent computing system Property, to the corporate intranet user such as hospital, school, when client operation operating system breaks down, investigation is more easy to positioning.This Outward, the rights management of user is realized by transparent computing system Web authentication server, system not only can be provided for all users One service, additionally it is possible to provide some personalized services for the user of different rights, such as each user have it is different can Operating system list of startup etc., perfect Consumer's Experience.
2nd, the ' In System Reconfiguration Method of the transparent computing system of the aforementioned method for authenticating user identity of use of the invention, configuration letter Singly it is easily achieved;User authentication policy module, reduces transplanting difficulty, expands the scope of application.
In addition to objects, features and advantages described above, the present invention also has other objects, features and advantages. Below with reference to accompanying drawings, the present invention is further detailed explanation.
Description of the drawings
The accompanying drawing for constituting the part of the application is used for providing a further understanding of the present invention, the schematic reality of the present invention Apply example and its illustrate, for explaining the present invention, not constituting inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the overall structure block diagram of the transparent computing system of the preferred embodiment of the present invention 1;
Fig. 2 is the schematic flow sheet of the method for authenticating user identity suitable for transparent computing system of the preferred embodiment of the present invention 1;
Fig. 3 is that the data form of the landing request information that the client of the preferred embodiment of the present invention 1 is sent to certificate server is shown It is intended to;
Fig. 4 is the data form schematic diagram of the text message of the authentication server response client of the preferred embodiment of the present invention 1;
Fig. 5 is the schematic flow sheet of the method for authenticating user identity suitable for transparent computing system of the preferred embodiment of the present invention 2;
Fig. 6 is the system of the transparent computing system of the method for authenticating user identity using the present invention of the preferred embodiment of the present invention 3 The flow chart of collocation method.
Specific embodiment
Embodiments of the invention are described in detail below in conjunction with accompanying drawing, but the present invention can be defined by the claims Implement with the multitude of different ways for covering.
Embodiment 1:
Fig. 1 shows the overall structure block diagram of the transparent computing system of the present embodiment, and client hardware platform is the shifting of x86 frameworks Dynamic flat board, good network boot NBP of the advance burning of its hard disk(According to the network boot that open source projects are write);Server End includes two parts:The certificate server of responsible user right information management(That is Web authentication server)With responsible user operation The storage server of system image storage.Storage server need to configure iSCSI service, DHCP service, and Web authentication server need to be matched somebody with somebody Put MySQL services, Tomcat services(Referring to embodiment 3).
Referring to Fig. 2, the method for authenticating user identity suitable for transparent computing system of the present embodiment, comprise the following steps:
S201:Establish machine login in client by cable, carry out network configuration first, obtain IP address, Dynamic Host Configuration Protocol server in a static manner According to configuration file static allocation IP that MAC and IP binds.
S202:Client sends landing request information to certificate server, and terminal bootstrap is by Web authentication server URL addresses, username and password information composition(The data form of landing request information is as shown in Figure 3)Landing request information, Web authentication server is sent to by http agreements to be authenticated.
S203:Web authentication server is according to the client user's name and encrypted message inquiry backstage MySQL data for receiving Storehouse, obtains the operating system permissions list of user.
S204:Web authentication serve end program will be comprising user right information(Have which operating system is available for user long-range Loading)Query Result write into text message according to the data form shown in Fig. 4, text information includes ID (Access fields), operating system quantity(Count fields), OS name(OS_name fields)And end mark(Flag words Section), and client is sent to by http agreements.
S205:Client searches the text data of Web authentication server return in internal memory, and parses ID (Access fields), operating system quantity(Count fields), OS name(OS_name fields)Etc. user right information.
S206:By user right information(I.e. alternative operating system list)It is presented on client screen and supplies user Select, according to the operating system that user selects to start, remote loading request, i.e. client are initiated to storage clothes to storage server Business device sends load request information, and load request packet contains user name, password, storage server address and remote operating system Mirror image unique mark.Certificate server is responsible for the rights management of user(Which has with the presence or absence of the user, the user in data base Operating system is available for remote loading), storage server also provided use in configuration file for each operating system mirror image Name in an account book password, for storage server end group in user's checking.In this step, regardless of whether there is the user all to need to carry out once Feedback.ID determines that the user whether there is, and non-existent user can not carry out subsequent authentication.There is user at least There is a system available, the title of the system can feed back to client and show.
S207:Storage server is authenticated to the username and password for initiating the client of remote loading request.
S208:The request that storage server passes through to username and password certification, queried access competence profile, checking Whether the client ip address for initiating request is allowed to load the operating system mirror image.
S209:IP address certification passes through, terminal on-demand loading remote operating system to local runtime, and data are passed with flowing block formula It is defeated.
Using static allocation IP, MAC and IP can be bound by Dynamic Host Configuration Protocol server, and storage server is close with user name is provided with Code and IP are limited, and together, client request Dynamic Host Configuration Protocol server static allocation IP is asked with MAC Address to three's indirect association , so the configuration file of storage server is consistent with Dynamic Host Configuration Protocol server configuration file.Client has user name password, MAC There are MAC Address, IP address in address, Dynamic Host Configuration Protocol server, and storage server has user name password, IP address, and this three parts configuration is needed Unanimously, cannot otherwise authenticate successfully.Because MAC and IP binding be DHCP provide static allocation mode, the present invention mainly in combination with IP mandates, and then MAC is incorporated.
Embodiment 2:
Referring to Fig. 5, the method for authenticating user identity suitable for transparent computing system of the present embodiment, comprise the following steps:
When user's start is logged in, following authenticating step is performed:
S1:Client sends landing request information bag to certificate server, the landing request information(Referring to Fig. 3)Including certification Server address, username and password.
S2:Certificate server inquires about background data base, obtains the bootable operating system permissions list of the user and writes Enter text message and be sent to client, the text message(Referring to Fig. 4)Including ID, operating system quantity, operation system System title and end mark.
S3:User selects to want the operating system of remote loading by client, initiates remote loading to storage server Request, load request packet contain user name, password, storage server address and remote operating system mirror image unique mark.
S4:Storage server is authenticated to the username and password from the client for initiating remote loading request, is recognized Card checks the configuration file of operating system of user mirror image after passing through, and confirm the IP of client whether with the operation system that will start The IP of system mirror image arranges consistent, such as consistent, then judge authenticating user identification success.
After authenticating user identification success, remote loading operating system image instance to client runs, juxtaposition active user For presence.
To sum up, the method for authenticating user identity suitable for transparent computing system of the invention, no longer merely uses user Name password, but by operating system of user mirror image and user using the IP address of client bind together, divided using static With IP modes, only could remote loading operating system mirror in the case of IP address, MAC Address and user name password are all correct As example is to local runtime, the security reliability of transparent computing system is enhanced, to the corporate intranet user such as hospital, school, visitor When family end operation operating system breaks down, investigation is more easy to positioning.
Additionally, the rights management of user is realized by transparent computing system Web authentication server, not only can be all User provides unified service, additionally it is possible to provide some personalized services for the user of different rights, such as each user There are different bootable operating system lists etc., perfect Consumer's Experience.
Embodiment 3:
Referring to Fig. 6, using embodiment 1 or the system configuration side of the transparent computing system of the method for authenticating user identity of embodiment 2 Method, comprises the following steps:
1)Add network configuration and authenticating user identification pol-icy code in bootstrap NBP source code, and recompilate generation NBP Bootstrap;
2)The main boot subregion MBR under BIOS patterns on the hard disk of erasing client, the NBP bootstrap that compiling is generated burn It is written to former main boot subregion MBR positions;
3)The MySQL and Tomcat service of configuration certificate server, and authentication background program is deployed in into web authentication service On the Tomcat of device;
4)The iSCSI service of configuration storage server, by operating system of user mirror image and user name and cryptographic binding, modification operation The access rights of system image, and the IP address being able to access that is set;
5)The configuration file of modification Dynamic Host Configuration Protocol server, distributes IP, in a static manner by the client using transparent computing system Physical address is bound with IP;
6)The operating system of user mirror image of remote loading is made, the network profile of each operating system nucleus is changed, will system Specified location of the operating system mirrored storage for performing in iSCSI configuration files.
Above-mentioned ' In System Reconfiguration Method, configuration are simply easily achieved;By user authentication policy module, transplanting is reduced difficult Degree, expands the scope of application.
The preferred embodiments of the present invention are the foregoing is only, the present invention is not limited to, for the skill of this area For art personnel, the present invention can have various modifications and variations.It is all within the spirit and principles in the present invention, made any repair Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (3)

1. a kind of method for authenticating user identity suitable for transparent computing system, it is characterised in that include logging in when user's start When, perform following authenticating step:
S1:Client obtains IP, configuration file static allocation IP that Dynamic Host Configuration Protocol server is bound according to MAC and IP in a static manner;
S2:Client send landing request information to certificate server, the landing request information include address of the authentication server, Username and password;
S3:Certificate server inquires about background data base, obtains the bootable operating system permissions list of the user and writes text This information is sent to client, and the text message includes ID, operating system quantity and OS name;
S4:User selects to want the operating system of remote loading by client, initiates remote loading request to storage server, The load request packet contains user name, password, storage server address and remote operating system mirror image unique mark;
S5:Storage server is authenticated to the username and password from the client for initiating remote loading request, and certification is led to Later check the configuration file of operating system of user mirror image, and confirm the IP of client whether with the operating system mirror that will start The IP of picture arranges consistent, such as consistent, then judge authenticating user identification success.
2. the method for authenticating user identity suitable for transparent computing system according to claim 1, it is characterised in that described In step S2 and S3, the client is communicated using http agreements with the certificate server;In step S4 and S5, The client is communicated using iSCSI protocol with the storage server.
3. a kind of using the transparent of the method for authenticating user identity for being applied to transparent computing system as claimed in claim 1 or 2 The ' In System Reconfiguration Method of computing system, it is characterised in that comprise the following steps:
1)Add network configuration, authenticating user identification pol-icy code in network boot NBP source code, and recompilate generation NBP bootstrap;
2)The main boot subregion MBR under BIOS patterns on the hard disk of erasing client, the NBP bootstrap generated with compiling are replaced Change former main boot subregion MBR;
3)The MySQL and Tomcat service of configuration certificate server, and authentication background program is deployed on Tomcat;
4)The iSCSI service of configuration storage server, by operating system of user mirror image and user name and cryptographic binding, modification operation The access rights of system image, and the IP address being able to access that is set;
5)The configuration file of modification Dynamic Host Configuration Protocol server, distributes IP, in a static manner by the client using transparent computing system Physical address is bound with IP;
6)The operating system of user mirror image of remote loading is made, the network profile of each operating system nucleus is changed, will system The position that the operating system mirrored storage for performing is specified in iSCSI configuration files.
CN201611130519.7A 2016-12-09 2016-12-09 A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system Active CN106549976B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611130519.7A CN106549976B (en) 2016-12-09 2016-12-09 A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611130519.7A CN106549976B (en) 2016-12-09 2016-12-09 A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system

Publications (2)

Publication Number Publication Date
CN106549976A true CN106549976A (en) 2017-03-29
CN106549976B CN106549976B (en) 2019-11-12

Family

ID=58397200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611130519.7A Active CN106549976B (en) 2016-12-09 2016-12-09 A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system

Country Status (1)

Country Link
CN (1) CN106549976B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197373A (en) * 2017-06-06 2017-09-22 深圳前海茂佳软件科技有限公司 TV access right management method, TV and computer-readable recording medium
CN107528918A (en) * 2017-09-15 2017-12-29 湖南新云网科技有限公司 Application program for mobile terminal management method and system based on lucidification disposal
CN107707656A (en) * 2017-10-10 2018-02-16 李梓彤 The remote loading method and system of operating system
CN110032414A (en) * 2019-03-06 2019-07-19 联想企业解决方案(新加坡)有限公司 Apparatus and method for secure user authentication in remote console mode
CN111291429A (en) * 2020-01-21 2020-06-16 李岗 Data protection method and system
CN115469878A (en) * 2022-09-13 2022-12-13 上海掌御信息科技有限公司 Android code diversity compiling method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1670698A (en) * 2005-04-06 2005-09-21 清华大学 Transparent computing based computing apparatus and method
CN102610012A (en) * 2012-02-14 2012-07-25 中国民航信息网络股份有限公司 Common platform system and method of electronic boarding card
CN102664958A (en) * 2012-04-27 2012-09-12 中山大学 Transparent computing system
CN104166586A (en) * 2014-09-04 2014-11-26 中南大学 Transparent computing method and transparent computing system based on virtualization technology
CN104363207A (en) * 2014-10-29 2015-02-18 北京成众志科技有限公司 Multi-factor security enhancement authorization and authentication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1670698A (en) * 2005-04-06 2005-09-21 清华大学 Transparent computing based computing apparatus and method
CN102610012A (en) * 2012-02-14 2012-07-25 中国民航信息网络股份有限公司 Common platform system and method of electronic boarding card
CN102664958A (en) * 2012-04-27 2012-09-12 中山大学 Transparent computing system
CN104166586A (en) * 2014-09-04 2014-11-26 中南大学 Transparent computing method and transparent computing system based on virtualization technology
CN104363207A (en) * 2014-10-29 2015-02-18 北京成众志科技有限公司 Multi-factor security enhancement authorization and authentication method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘新向: "利用DHCP服务器分配静态IP地址", 《洛阳师范学院学报》 *
周悦芝: "一种用于网络计算的可定制启动协议", 《软件学报》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197373A (en) * 2017-06-06 2017-09-22 深圳前海茂佳软件科技有限公司 TV access right management method, TV and computer-readable recording medium
CN107528918A (en) * 2017-09-15 2017-12-29 湖南新云网科技有限公司 Application program for mobile terminal management method and system based on lucidification disposal
CN107707656A (en) * 2017-10-10 2018-02-16 李梓彤 The remote loading method and system of operating system
CN110032414A (en) * 2019-03-06 2019-07-19 联想企业解决方案(新加坡)有限公司 Apparatus and method for secure user authentication in remote console mode
CN110032414B (en) * 2019-03-06 2023-06-06 联想企业解决方案(新加坡)有限公司 Apparatus and method for secure user authentication in remote console mode
CN111291429A (en) * 2020-01-21 2020-06-16 李岗 Data protection method and system
CN115469878A (en) * 2022-09-13 2022-12-13 上海掌御信息科技有限公司 Android code diversity compiling method
CN115469878B (en) * 2022-09-13 2023-11-24 上海掌御信息科技有限公司 Android code diversity compiling method

Also Published As

Publication number Publication date
CN106549976B (en) 2019-11-12

Similar Documents

Publication Publication Date Title
CN106549976A (en) A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system
US10686655B2 (en) Proximity and context aware mobile workspaces in enterprise systems
JP6782307B2 (en) Dynamic access to hosted applications
US10447684B2 (en) Hosted application sandbox model
US8370905B2 (en) Domain access system
US10331882B2 (en) Tracking and managing virtual desktops using signed tokens
CN106411857B (en) A kind of private clound GIS service access control method based on virtual isolation mech isolation test
US20180026984A1 (en) Access authentication for cloud-based shared content
US9154504B2 (en) Device apparatus, control method, and relating storage medium
US9380062B2 (en) Techniques for sharing virtual machine (VM) resources
US20050120199A1 (en) Distributed dynamic security for document collaboration
KR101886946B1 (en) Relay proxy providing secure connectivity in a controlled network environment
US20150200928A1 (en) Techniques for secure access management in virtual environments
CN105379223A (en) Validating the identity of a mobile application for mobile application management
CN102404314A (en) Remote resources single-point sign on
US20140150055A1 (en) Data reference system and application authentication method
CN101540757A (en) Method and system for identifying network and identification equipment
US20210203654A1 (en) Local Mapped Accounts in Virtual Desktops
CN104348895A (en) Method and device for sharing data among programs in mobile terminal
EP3685265A1 (en) Geographic location based computing asset provisioning in distributed computing systems
CN111108736A (en) Automatic address failover for receivers and browsers using cloud services
WO2013137842A1 (en) A system and method for accessing a service
US9043935B2 (en) Techniques for personalizing content
CN105814834B (en) Push-based trust model for public cloud applications
CN112560006A (en) Single sign-on method and system under multi-application system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant