CN106549976B - A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system - Google Patents

A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system Download PDF

Info

Publication number
CN106549976B
CN106549976B CN201611130519.7A CN201611130519A CN106549976B CN 106549976 B CN106549976 B CN 106549976B CN 201611130519 A CN201611130519 A CN 201611130519A CN 106549976 B CN106549976 B CN 106549976B
Authority
CN
China
Prior art keywords
user
client
operating system
server
computing system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611130519.7A
Other languages
Chinese (zh)
Other versions
CN106549976A (en
Inventor
郑瑾
李俊
张尧学
胡小龙
张祖平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN201611130519.7A priority Critical patent/CN106549976B/en
Publication of CN106549976A publication Critical patent/CN106549976A/en
Application granted granted Critical
Publication of CN106549976B publication Critical patent/CN106549976B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system, the authentication method includes when user is switched on and logs in, client sends landing request information to certificate server, certificate server inquires background data base, obtains the bootable operating system permissions list of user and is sent to client;User's selection operation system initiates remote loading request to storage server;Storage server authenticates the username and password of client, and the configuration file of operating system of user mirror image is checked in certification after passing through, and determines certification success or not with by the IP setting of operating system mirror image to be started according to the IP of client.The ' In System Reconfiguration Method is used to configure the transparent computing system using the method for authenticating user identity.The present invention realizes the rights management of user, can provide some personalized services, perfect user experience.

Description

A kind of method for authenticating user identity and system configuration suitable for transparent computing system Method
Technical field
The present invention relates to transparent computing system fields, more particularly to the user identity authentication side suitable for transparent computing system The configuration method of method and the transparent computing system using the method for authenticating user identity.
Background technique
Lucidification disposal is a kind of user without perceptual computing machine operating system, middleware, application program and communication network Where specific, only need according to their own needs, by network from required various clients (including fixation, movement, Yi Jijia All kinds of clients in front yard) in select and using respective service (such as calculating, phone, TV, online and amusement etc.) calculating Mode.The feature of transparent computing system mainly has the following:
I, storage is separated with calculating.Transparent computing system is divided into two parts of client and server, and wherein user uses Client without installing any operating system and application software in advance, all software resources are uniformly stored in server. When user accesses lucidification disposal server, on-demand loading software resource, and be performed locally and calculate.
II, the support of cross-terminal, spanning operation system platform.User can access lucidification disposal server in any terminal Service needed for obtaining, and selection operation system platform as needed.It is not needed for client, before use or as far as possible The installation and configuration to client are reduced, to improve user experience.
III, instruction and data is transmitted using stream block formula between client and server.Client is operated in remote loading It when system, does not need the locally downloading operation of whole operation system, but it is identical that the data that server stores are divided into size Data block, the data block of part needed for client is only downloaded, all data blocks are transmitted in the form of data flow.
But there are following disadvantages for the authentication of lucidification disposal at present:
(1) traditional static password identity identifying technology only distinguishes that user has not been suitable for newly by user name, password The Transparent Calculation Model of type.Operating system is supplied to user by lucidification disposal, and is responsible for storage program area The storage server of mirror image and the certificate server of responsible user authority management are separated from each other, and simple verifying is not one is can Guaranteeing secure user data, illegal user is if it is known that operating system mirror image address, then certificate server can be got around, The operating system mirror image for directly initiating storage server causes the safety problems such as user data leakage.
(2) the novel identity identifying technology such as short message password, dynamic password needs to complete by third party's assistance, uses The personal information of user will certainly be shared with third party by this mode, this is not that user is ready to see.
(3) lucidification disposal plays increasingly important role in fields such as medical treatment, education, and these fields have one to be total to Same feature: Intranet is all that IP address is distributed in a manner of static IP, and static allocation IP mode exists compared to dynamic acquisition IP advantage It will not conflict in Intranet user IP, break down and be easy positioning, there is special network administrator to be responsible for IP management.And lucidification disposal System still can not distinguish user in terminal user's running example operating system using dynamic acquisition IP mode at present in real time Identity is unfavorable for the positioning and exclusion of failure.
Summary of the invention
It is an object of that present invention to provide a kind of method for authenticating user identity suitable for transparent computing system to use the user The configuration method of the transparent computing system of identity identifying method easily causes use to solve the single capacity certification of current lucidification disposal The technical issues of user data is revealed, third party is needed to assist and can not distinguish user identity in real time.
To achieve the above object, the present invention provides a kind of method for authenticating user identity suitable for transparent computing system, Including executing following authenticating step when user is switched on and logs in:
S1: client obtains IP, the configuration file static allocation that Dynamic Host Configuration Protocol server is bound according to MAC and IP in a static manner IP;
S2: client send landing request information to certificate server, landing request information include address of the authentication server, Username and password;
S3: certificate server inquires background data base, obtains the bootable operating system permissions list of user and text is written This information is sent to client, and text information includes user identifier, operating system quantity and OS name;
S4: user selects to want the operating system of remote loading by client, initiates remote loading to storage server Request, load request information include user name, password, storage server address and remote operating system mirror image unique identification;
S5: storage server authenticates the username and password from the client for initiating remote loading request, recognizes Card pass through after check the configuration file of operating system of user mirror image, and confirm client IP whether with by operation to be started system The IP setting of system mirror image is consistent, such as consistent, then determines that user identity authentication is successful.
Further improvement as method for authenticating user identity of the invention:
In step S2 and S3, client is communicated with certificate server using http agreement;In step S4 and S5, client End is communicated with storage server using iSCSI protocol.
As a general technical idea, the above-mentioned transparent computing system that is suitable for is used the present invention also provides a kind of The ' In System Reconfiguration Method of the transparent computing system of method for authenticating user identity, comprising the following steps:
1) network configuration, user identity authentication pol-icy code are added in network boot NBP source code, and are recompilated Generate NBP bootstrap;
2) the main boot subregion MBR under the BIOS mode on the hard disk of client is wiped, guides journey with the NBP that compiling generates Sequence replaces former main boot subregion MBR;
3) MySQL and the Tomcat service of certificate server are configured, and authentication background program is deployed in Tomcat On;
4) iSCSI service for configuring storage server, by operating system of user mirror image and user name and cryptographic binding, modification The access authority of operating system mirror image, and the IP address being able to access that is set;
5) configuration file for modifying Dynamic Host Configuration Protocol server, distributes IP in a static manner, by the client of application transparent computing system The physical address and IP at end are bound;
6) the operating system of user mirror image for making remote loading, modifies the network profile of each operating system nucleus, The position that the operating system mirrored storage made is specified in iSCSI configuration file.
The invention has the following advantages:
1, the method for authenticating user identity suitable for transparent computing system of the invention, by user client MAC Address, IP Address and user identity combine, and user need to repeatedly be authenticated when obtaining service to certificate server and storage server, Certificate server is responsible for the rights management of user, and storage server is not only responsible for operating system of user mirrored storage, also based on use Family authentication and user identity is authenticated based on IP address authorization two ways.Enhance the safety of transparent computing system Reliability when client runs operating system failure, is easier to investigation and positioning to the corporate intranets user such as hospital, school. In addition, realizing the rights management of user by transparent computing system Web authentication server, can not only be provided for all users Unified service, additionally it is possible to provide some personalized services for the user of different rights, such as each user have it is different Bootable operating system list etc., perfect user experience.
2, the ' In System Reconfiguration Method of the transparent computing system of the invention using aforementioned method for authenticating user identity, configuration letter Singly it is easily achieved;User authentication policy module reduces transplanting difficulty, expands the scope of application.
Other than objects, features and advantages described above, there are also other objects, features and advantages by the present invention. Below with reference to accompanying drawings, the present invention is described in further detail.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present invention, schematic reality of the invention It applies example and its explanation is used to explain the present invention, do not constitute improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the overall structure block diagram of the transparent computing system of the preferred embodiment of the present invention 1;
Fig. 2 is that the process of the method for authenticating user identity suitable for transparent computing system of the preferred embodiment of the present invention 1 is shown It is intended to;
Fig. 3 is the data lattice that the client of the preferred embodiment of the present invention 1 is sent to the landing request information of certificate server Formula schematic diagram;
Fig. 4 is the data format signal of the text information of the authentication server response client of the preferred embodiment of the present invention 1 Figure;
Fig. 5 is that the process of the method for authenticating user identity suitable for transparent computing system of the preferred embodiment of the present invention 2 is shown It is intended to;
Fig. 6 is the transparent computing system using method for authenticating user identity of the invention of the preferred embodiment of the present invention 3 The flow chart of ' In System Reconfiguration Method.
Specific embodiment
The embodiment of the present invention is described in detail below in conjunction with attached drawing, but the present invention can be defined by the claims Implement with the multitude of different ways of covering.
Embodiment 1:
Fig. 1 shows the overall structure block diagram of the transparent computing system of the present embodiment, and client hardware platform is x86 framework Mobile plate, the network boot that the good network boot NBP(of the preparatory burning of hard disk writes according to open source projects);Clothes Business device end includes two parts: the certificate server (i.e. Web authentication server) of responsible user right information management and responsible user The storage server of operating system mirrored storage.Storage server need to configure iSCSI service, DHCP service, Web authentication server MySQL service, Tomcat service need to be configured (referring to embodiment 3).
Referring to fig. 2, the method for authenticating user identity suitable for transparent computing system of the present embodiment, comprising the following steps:
S201: client powers on booting and logs in, first progress network configuration, obtains IP address, DHCP clothes in a static manner The configuration file static allocation IP that business device is bound according to MAC and IP.
S202: client sends landing request information to certificate server, and terminal bootstrap is by Web authentication server The address URL, username and password information form the landing request information of (data format of landing request information is as shown in Figure 3), Web authentication server is sent to by http agreement to be authenticated.
S203:Web certificate server inquires backstage MySQL data according to the client user's name and encrypted message that receive Library obtains the operating system permissions list of user.
Which operating system will be S204:Web certificate server program (will have long-range for user comprising user right information Load) query result write into text information according to data format shown in Fig. 4, text information includes user identifier (Access field), operating system quantity (Count field), OS name (OS_name field) and end mark (Flag word Section), and client is sent to by http agreement.
S205: client searches the text data of Web authentication server return in memory, and parses user identifier The user right informations such as (Access field), operating system quantity (Count field), OS name (OS_name field).
S206: user right information (i.e. alternative operating system list) is presented on client screen for user Selection selects the operating system of starting according to user, initiates remote loading request to storage server, i.e. client takes to storage Business device sends load request information, and load request information includes user name, password, storage server address and remote operating system Mirror image unique identification.Which the rights management that certificate server is responsible for user (has with the presence or absence of the user, the user in database Operating system is for remote loading), storage server also provided use for each operating system mirror image in configuration file Name in an account book password, for storage server end group in user's checking.In this step, regardless of whether all needing to carry out once there are the user Feedback.User identifier determines that the user whether there is, and the user being not present is not can be carried out subsequent authentication.There are users at least There is a system available, the title of the system can feed back to client and show.
S207: storage server authenticates the username and password for the client for initiating remote loading request.
S208: storage server authenticates the request passed through, queried access competence profile, verifying to username and password Whether the client ip address for initiating request is allowed to load the operating system mirror image.
S209:IP address verification passes through, terminal on-demand loading remote operating system to local runtime, and data are to flow block formula biography It is defeated.
Using static allocation IP, Dynamic Host Configuration Protocol server can bind MAC and IP, and storage server is close with user name is provided with Code and IP limitation, together, client request Dynamic Host Configuration Protocol server static allocation IP is requested with MAC Address to three's indirect association , so the configuration file of storage server is consistent with Dynamic Host Configuration Protocol server configuration file.Client has user name password, MAC Address, Dynamic Host Configuration Protocol server have MAC Address, IP address, and storage server has user name password, IP address, and the configuration of this three parts needs Unanimously, success can not otherwise be authenticated.Because MAC and IP binding be DHCP provide static allocation mode, the present invention mainly in combination with IP authorization, and then MAC incorporated.
Embodiment 2:
Referring to Fig. 5, the method for authenticating user identity suitable for transparent computing system of the present embodiment, comprising the following steps:
When user, which is switched on, to be logged in, following authenticating step is executed:
S1: client sends landing request information packet to certificate server, and the landing request information (referring to Fig. 3) includes Address of the authentication server, username and password.
S2: certificate server inquires background data base, obtains the bootable operating system permissions list of the user and writes Enter text information and be sent to client, the text information (referring to fig. 4) includes user identifier, operating system quantity, operation system Title of uniting and end mark.
S3: user selects to want the operating system of remote loading by client, initiates remote loading to storage server Request, load request information include user name, password, storage server address and remote operating system mirror image unique identification.
S4: storage server authenticates the username and password from the client for initiating remote loading request, recognizes Card pass through after check the configuration file of operating system of user mirror image, and confirm client IP whether with by operation to be started system The IP setting of system mirror image is consistent, such as consistent, then determines that user identity authentication is successful.
After user identity authentication success, remote loading operating system image instance to client is run, juxtaposition active user For presence.
To sum up, the method for authenticating user identity suitable for transparent computing system of the invention no longer merely uses user Name password, but the IP address for the client that operating system of user mirror image is used with user is bound together, use static state point It, could remote loading operating system mirror only in IP address, MAC Address and all correct situation of user name password with IP mode Picture example enhances the security reliability of transparent computing system to local runtime, to the corporate intranets user such as hospital, school, visitor When family end runs operating system failure, it is easier to investigation and positioning.
It not only can be all in addition, realizing the rights management of user by transparent computing system Web authentication server User provides unified service, additionally it is possible to provide some personalized services, such as each user for the user of different rights There is a different bootable operating system lists etc., perfect user experience.
Embodiment 3:
Referring to Fig. 6, the system using the transparent computing system of the method for authenticating user identity of embodiment 1 or embodiment 2 is matched Set method, comprising the following steps:
1) network configuration and user identity authentication pol-icy code are added in bootstrap NBP source code, and recompilate life At NBP bootstrap;
2) the main boot subregion MBR under the BIOS mode on the hard disk of client is wiped, the NBP that compiling is generated guides journey Sequence programming is to the former position main boot subregion MBR;
3) MySQL and the Tomcat service of certificate server are configured, and authentication background program is deployed in web authentication On the Tomcat of server;
4) iSCSI service for configuring storage server, by operating system of user mirror image and user name and cryptographic binding, modification The access authority of operating system mirror image, and the IP address being able to access that is set;
5) configuration file for modifying Dynamic Host Configuration Protocol server, distributes IP in a static manner, by the client of application transparent computing system The physical address and IP at end are bound;
6) the operating system of user mirror image for making remote loading, modifies the network profile of each operating system nucleus, By designated position of the operating system mirrored storage made in iSCSI configuration file.
Above-mentioned ' In System Reconfiguration Method, configuration are simply easily achieved;By user authentication policy module, it is difficult to reduce transplanting Degree, expands the scope of application.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (3)

1. a kind of method for authenticating user identity suitable for transparent computing system, which is characterized in that including being logged in when user is switched on When, execute following authenticating step:
S1: client obtains IP, the configuration file static allocation IP that Dynamic Host Configuration Protocol server is bound according to MAC and IP in a static manner;
S2: client send landing request information to certificate server, the landing request information include address of the authentication server, Username and password;
S3: certificate server inquires background data base, obtains the bootable operating system permissions list of the user and text is written This information is sent to client, and the text information includes user identifier, operating system quantity and OS name;
S4: user selects to want the operating system of remote loading by client, initiates remote loading request to storage server, The load request information includes user name, password, storage server address and remote operating system mirror image unique identification;
S5: storage server authenticates the username and password from the client for initiating remote loading request, and certification is logical Later check the configuration file of operating system of user mirror image, and confirm client IP whether with by operating system mirror to be started The IP setting of picture is consistent, such as consistent, then determines user identity authentication success.
2. the method for authenticating user identity according to claim 1 suitable for transparent computing system, which is characterized in that described In step S2 and S3, the client is communicated with the certificate server using http agreement;In the step S4 and S5, The client is communicated with the storage server using iSCSI protocol.
3. a kind of using as claimed in claim 1 or 2 suitable for the transparent of the method for authenticating user identity of transparent computing system The ' In System Reconfiguration Method of computing system, which comprises the following steps:
1) network configuration, user identity authentication pol-icy code are added in network boot NBP source code, and recompilate generation NBP bootstrap;
2) the main boot subregion MBR under the BIOS mode on the hard disk of client is wiped, is replaced with the NBP bootstrap that compiling generates Change former main boot subregion MBR;
3) MySQL and the Tomcat service of certificate server are configured, and authentication background program is deployed on Tomcat;
4) iSCSI service for configuring storage server, by operating system of user mirror image and user name and cryptographic binding, modification operation The access authority of system image, and the IP address being able to access that is set;
5) configuration file for modifying Dynamic Host Configuration Protocol server, distributes IP in a static manner, by the client of application transparent computing system Physical address and IP are bound;
6) the operating system of user mirror image for making remote loading, modifies the network profile of each operating system nucleus, will make The position that the operating system mirrored storage performed is specified in iSCSI configuration file.
CN201611130519.7A 2016-12-09 2016-12-09 A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system Active CN106549976B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611130519.7A CN106549976B (en) 2016-12-09 2016-12-09 A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611130519.7A CN106549976B (en) 2016-12-09 2016-12-09 A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system

Publications (2)

Publication Number Publication Date
CN106549976A CN106549976A (en) 2017-03-29
CN106549976B true CN106549976B (en) 2019-11-12

Family

ID=58397200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611130519.7A Active CN106549976B (en) 2016-12-09 2016-12-09 A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system

Country Status (1)

Country Link
CN (1) CN106549976B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197373A (en) * 2017-06-06 2017-09-22 深圳前海茂佳软件科技有限公司 TV access right management method, TV and computer-readable recording medium
CN107528918A (en) * 2017-09-15 2017-12-29 湖南新云网科技有限公司 Application program for mobile terminal management method and system based on lucidification disposal
CN107707656A (en) * 2017-10-10 2018-02-16 李梓彤 The remote loading method and system of operating system
CN110032414B (en) * 2019-03-06 2023-06-06 联想企业解决方案(新加坡)有限公司 Apparatus and method for secure user authentication in remote console mode
CN111291429B (en) * 2020-01-21 2023-04-25 李岗 Data protection method and system
CN115469878B (en) * 2022-09-13 2023-11-24 上海掌御信息科技有限公司 Android code diversity compiling method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1670698A (en) * 2005-04-06 2005-09-21 清华大学 Transparent computing based computing apparatus and method
CN102610012A (en) * 2012-02-14 2012-07-25 中国民航信息网络股份有限公司 Common platform system and method of electronic boarding card
CN102664958A (en) * 2012-04-27 2012-09-12 中山大学 Transparent computing system
CN104166586A (en) * 2014-09-04 2014-11-26 中南大学 Transparent computing method and transparent computing system based on virtualization technology
CN104363207A (en) * 2014-10-29 2015-02-18 北京成众志科技有限公司 Multi-factor security enhancement authorization and authentication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1670698A (en) * 2005-04-06 2005-09-21 清华大学 Transparent computing based computing apparatus and method
CN102610012A (en) * 2012-02-14 2012-07-25 中国民航信息网络股份有限公司 Common platform system and method of electronic boarding card
CN102664958A (en) * 2012-04-27 2012-09-12 中山大学 Transparent computing system
CN104166586A (en) * 2014-09-04 2014-11-26 中南大学 Transparent computing method and transparent computing system based on virtualization technology
CN104363207A (en) * 2014-10-29 2015-02-18 北京成众志科技有限公司 Multi-factor security enhancement authorization and authentication method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种用于网络计算的可定制启动协议;周悦芝;《软件学报》;20031231;全文 *
利用DHCP服务器分配静态IP地址;刘新向;《洛阳师范学院学报》;20050531;第4节 *

Also Published As

Publication number Publication date
CN106549976A (en) 2017-03-29

Similar Documents

Publication Publication Date Title
CN106549976B (en) A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system
EP3353982B1 (en) Using derived credentials for enrollment with enterprise mobile device management services
CN107172054B (en) Authority authentication method, device and system based on CAS
US9154504B2 (en) Device apparatus, control method, and relating storage medium
US8370905B2 (en) Domain access system
US9026795B2 (en) Apparatus and method for signing application
US20210314171A1 (en) System and method for establishing dynamic trust credentials for network functions
US20200374121A1 (en) Computing system and methods providing session access based upon authentication token with different authentication credentials
US10187386B2 (en) Native enrollment of mobile devices
CN110417730B (en) Unified access method of multiple application programs and related equipment
CN106257861A (en) By controlling authentication method and the system thereof of equipment and auto communication
CA2951914C (en) Restricted code signing
US20140150055A1 (en) Data reference system and application authentication method
US10621335B2 (en) Method and device for verifying security of application
CN103136478B (en) A kind of method for managing security of terminal applies and system
CN111881483B (en) Resource account binding method, device, equipment and medium based on blockchain
US20190098107A1 (en) Geographic location based user computing asset provisioning in distributed computing systems
CN104348895A (en) Method and device for sharing data among programs in mobile terminal
KR102063033B1 (en) User terminal for using cloud service, integrated security management server of user terminal and method thereof
CN105814834B (en) Push-based trust model for public cloud applications
US11681513B2 (en) Controlled scope of authentication key for software update
CN104158812A (en) Method and system of safety control of terminal application
CN114499977B (en) Authentication method and device
CN105262754A (en) Eyeball registration method and device
EP3143749B1 (en) Restricted code signing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant