CN106549976B - A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system - Google Patents
A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system Download PDFInfo
- Publication number
- CN106549976B CN106549976B CN201611130519.7A CN201611130519A CN106549976B CN 106549976 B CN106549976 B CN 106549976B CN 201611130519 A CN201611130519 A CN 201611130519A CN 106549976 B CN106549976 B CN 106549976B
- Authority
- CN
- China
- Prior art keywords
- user
- client
- operating system
- server
- computing system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system, the authentication method includes when user is switched on and logs in, client sends landing request information to certificate server, certificate server inquires background data base, obtains the bootable operating system permissions list of user and is sent to client;User's selection operation system initiates remote loading request to storage server;Storage server authenticates the username and password of client, and the configuration file of operating system of user mirror image is checked in certification after passing through, and determines certification success or not with by the IP setting of operating system mirror image to be started according to the IP of client.The ' In System Reconfiguration Method is used to configure the transparent computing system using the method for authenticating user identity.The present invention realizes the rights management of user, can provide some personalized services, perfect user experience.
Description
Technical field
The present invention relates to transparent computing system fields, more particularly to the user identity authentication side suitable for transparent computing system
The configuration method of method and the transparent computing system using the method for authenticating user identity.
Background technique
Lucidification disposal is a kind of user without perceptual computing machine operating system, middleware, application program and communication network
Where specific, only need according to their own needs, by network from required various clients (including fixation, movement, Yi Jijia
All kinds of clients in front yard) in select and using respective service (such as calculating, phone, TV, online and amusement etc.) calculating
Mode.The feature of transparent computing system mainly has the following:
I, storage is separated with calculating.Transparent computing system is divided into two parts of client and server, and wherein user uses
Client without installing any operating system and application software in advance, all software resources are uniformly stored in server.
When user accesses lucidification disposal server, on-demand loading software resource, and be performed locally and calculate.
II, the support of cross-terminal, spanning operation system platform.User can access lucidification disposal server in any terminal
Service needed for obtaining, and selection operation system platform as needed.It is not needed for client, before use or as far as possible
The installation and configuration to client are reduced, to improve user experience.
III, instruction and data is transmitted using stream block formula between client and server.Client is operated in remote loading
It when system, does not need the locally downloading operation of whole operation system, but it is identical that the data that server stores are divided into size
Data block, the data block of part needed for client is only downloaded, all data blocks are transmitted in the form of data flow.
But there are following disadvantages for the authentication of lucidification disposal at present:
(1) traditional static password identity identifying technology only distinguishes that user has not been suitable for newly by user name, password
The Transparent Calculation Model of type.Operating system is supplied to user by lucidification disposal, and is responsible for storage program area
The storage server of mirror image and the certificate server of responsible user authority management are separated from each other, and simple verifying is not one is can
Guaranteeing secure user data, illegal user is if it is known that operating system mirror image address, then certificate server can be got around,
The operating system mirror image for directly initiating storage server causes the safety problems such as user data leakage.
(2) the novel identity identifying technology such as short message password, dynamic password needs to complete by third party's assistance, uses
The personal information of user will certainly be shared with third party by this mode, this is not that user is ready to see.
(3) lucidification disposal plays increasingly important role in fields such as medical treatment, education, and these fields have one to be total to
Same feature: Intranet is all that IP address is distributed in a manner of static IP, and static allocation IP mode exists compared to dynamic acquisition IP advantage
It will not conflict in Intranet user IP, break down and be easy positioning, there is special network administrator to be responsible for IP management.And lucidification disposal
System still can not distinguish user in terminal user's running example operating system using dynamic acquisition IP mode at present in real time
Identity is unfavorable for the positioning and exclusion of failure.
Summary of the invention
It is an object of that present invention to provide a kind of method for authenticating user identity suitable for transparent computing system to use the user
The configuration method of the transparent computing system of identity identifying method easily causes use to solve the single capacity certification of current lucidification disposal
The technical issues of user data is revealed, third party is needed to assist and can not distinguish user identity in real time.
To achieve the above object, the present invention provides a kind of method for authenticating user identity suitable for transparent computing system,
Including executing following authenticating step when user is switched on and logs in:
S1: client obtains IP, the configuration file static allocation that Dynamic Host Configuration Protocol server is bound according to MAC and IP in a static manner
IP;
S2: client send landing request information to certificate server, landing request information include address of the authentication server,
Username and password;
S3: certificate server inquires background data base, obtains the bootable operating system permissions list of user and text is written
This information is sent to client, and text information includes user identifier, operating system quantity and OS name;
S4: user selects to want the operating system of remote loading by client, initiates remote loading to storage server
Request, load request information include user name, password, storage server address and remote operating system mirror image unique identification;
S5: storage server authenticates the username and password from the client for initiating remote loading request, recognizes
Card pass through after check the configuration file of operating system of user mirror image, and confirm client IP whether with by operation to be started system
The IP setting of system mirror image is consistent, such as consistent, then determines that user identity authentication is successful.
Further improvement as method for authenticating user identity of the invention:
In step S2 and S3, client is communicated with certificate server using http agreement;In step S4 and S5, client
End is communicated with storage server using iSCSI protocol.
As a general technical idea, the above-mentioned transparent computing system that is suitable for is used the present invention also provides a kind of
The ' In System Reconfiguration Method of the transparent computing system of method for authenticating user identity, comprising the following steps:
1) network configuration, user identity authentication pol-icy code are added in network boot NBP source code, and are recompilated
Generate NBP bootstrap;
2) the main boot subregion MBR under the BIOS mode on the hard disk of client is wiped, guides journey with the NBP that compiling generates
Sequence replaces former main boot subregion MBR;
3) MySQL and the Tomcat service of certificate server are configured, and authentication background program is deployed in Tomcat
On;
4) iSCSI service for configuring storage server, by operating system of user mirror image and user name and cryptographic binding, modification
The access authority of operating system mirror image, and the IP address being able to access that is set;
5) configuration file for modifying Dynamic Host Configuration Protocol server, distributes IP in a static manner, by the client of application transparent computing system
The physical address and IP at end are bound;
6) the operating system of user mirror image for making remote loading, modifies the network profile of each operating system nucleus,
The position that the operating system mirrored storage made is specified in iSCSI configuration file.
The invention has the following advantages:
1, the method for authenticating user identity suitable for transparent computing system of the invention, by user client MAC Address, IP
Address and user identity combine, and user need to repeatedly be authenticated when obtaining service to certificate server and storage server,
Certificate server is responsible for the rights management of user, and storage server is not only responsible for operating system of user mirrored storage, also based on use
Family authentication and user identity is authenticated based on IP address authorization two ways.Enhance the safety of transparent computing system
Reliability when client runs operating system failure, is easier to investigation and positioning to the corporate intranets user such as hospital, school.
In addition, realizing the rights management of user by transparent computing system Web authentication server, can not only be provided for all users
Unified service, additionally it is possible to provide some personalized services for the user of different rights, such as each user have it is different
Bootable operating system list etc., perfect user experience.
2, the ' In System Reconfiguration Method of the transparent computing system of the invention using aforementioned method for authenticating user identity, configuration letter
Singly it is easily achieved;User authentication policy module reduces transplanting difficulty, expands the scope of application.
Other than objects, features and advantages described above, there are also other objects, features and advantages by the present invention.
Below with reference to accompanying drawings, the present invention is described in further detail.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present invention, schematic reality of the invention
It applies example and its explanation is used to explain the present invention, do not constitute improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the overall structure block diagram of the transparent computing system of the preferred embodiment of the present invention 1;
Fig. 2 is that the process of the method for authenticating user identity suitable for transparent computing system of the preferred embodiment of the present invention 1 is shown
It is intended to;
Fig. 3 is the data lattice that the client of the preferred embodiment of the present invention 1 is sent to the landing request information of certificate server
Formula schematic diagram;
Fig. 4 is the data format signal of the text information of the authentication server response client of the preferred embodiment of the present invention 1
Figure;
Fig. 5 is that the process of the method for authenticating user identity suitable for transparent computing system of the preferred embodiment of the present invention 2 is shown
It is intended to;
Fig. 6 is the transparent computing system using method for authenticating user identity of the invention of the preferred embodiment of the present invention 3
The flow chart of ' In System Reconfiguration Method.
Specific embodiment
The embodiment of the present invention is described in detail below in conjunction with attached drawing, but the present invention can be defined by the claims
Implement with the multitude of different ways of covering.
Embodiment 1:
Fig. 1 shows the overall structure block diagram of the transparent computing system of the present embodiment, and client hardware platform is x86 framework
Mobile plate, the network boot that the good network boot NBP(of the preparatory burning of hard disk writes according to open source projects);Clothes
Business device end includes two parts: the certificate server (i.e. Web authentication server) of responsible user right information management and responsible user
The storage server of operating system mirrored storage.Storage server need to configure iSCSI service, DHCP service, Web authentication server
MySQL service, Tomcat service need to be configured (referring to embodiment 3).
Referring to fig. 2, the method for authenticating user identity suitable for transparent computing system of the present embodiment, comprising the following steps:
S201: client powers on booting and logs in, first progress network configuration, obtains IP address, DHCP clothes in a static manner
The configuration file static allocation IP that business device is bound according to MAC and IP.
S202: client sends landing request information to certificate server, and terminal bootstrap is by Web authentication server
The address URL, username and password information form the landing request information of (data format of landing request information is as shown in Figure 3),
Web authentication server is sent to by http agreement to be authenticated.
S203:Web certificate server inquires backstage MySQL data according to the client user's name and encrypted message that receive
Library obtains the operating system permissions list of user.
Which operating system will be S204:Web certificate server program (will have long-range for user comprising user right information
Load) query result write into text information according to data format shown in Fig. 4, text information includes user identifier
(Access field), operating system quantity (Count field), OS name (OS_name field) and end mark (Flag word
Section), and client is sent to by http agreement.
S205: client searches the text data of Web authentication server return in memory, and parses user identifier
The user right informations such as (Access field), operating system quantity (Count field), OS name (OS_name field).
S206: user right information (i.e. alternative operating system list) is presented on client screen for user
Selection selects the operating system of starting according to user, initiates remote loading request to storage server, i.e. client takes to storage
Business device sends load request information, and load request information includes user name, password, storage server address and remote operating system
Mirror image unique identification.Which the rights management that certificate server is responsible for user (has with the presence or absence of the user, the user in database
Operating system is for remote loading), storage server also provided use for each operating system mirror image in configuration file
Name in an account book password, for storage server end group in user's checking.In this step, regardless of whether all needing to carry out once there are the user
Feedback.User identifier determines that the user whether there is, and the user being not present is not can be carried out subsequent authentication.There are users at least
There is a system available, the title of the system can feed back to client and show.
S207: storage server authenticates the username and password for the client for initiating remote loading request.
S208: storage server authenticates the request passed through, queried access competence profile, verifying to username and password
Whether the client ip address for initiating request is allowed to load the operating system mirror image.
S209:IP address verification passes through, terminal on-demand loading remote operating system to local runtime, and data are to flow block formula biography
It is defeated.
Using static allocation IP, Dynamic Host Configuration Protocol server can bind MAC and IP, and storage server is close with user name is provided with
Code and IP limitation, together, client request Dynamic Host Configuration Protocol server static allocation IP is requested with MAC Address to three's indirect association
, so the configuration file of storage server is consistent with Dynamic Host Configuration Protocol server configuration file.Client has user name password, MAC
Address, Dynamic Host Configuration Protocol server have MAC Address, IP address, and storage server has user name password, IP address, and the configuration of this three parts needs
Unanimously, success can not otherwise be authenticated.Because MAC and IP binding be DHCP provide static allocation mode, the present invention mainly in combination with
IP authorization, and then MAC incorporated.
Embodiment 2:
Referring to Fig. 5, the method for authenticating user identity suitable for transparent computing system of the present embodiment, comprising the following steps:
When user, which is switched on, to be logged in, following authenticating step is executed:
S1: client sends landing request information packet to certificate server, and the landing request information (referring to Fig. 3) includes
Address of the authentication server, username and password.
S2: certificate server inquires background data base, obtains the bootable operating system permissions list of the user and writes
Enter text information and be sent to client, the text information (referring to fig. 4) includes user identifier, operating system quantity, operation system
Title of uniting and end mark.
S3: user selects to want the operating system of remote loading by client, initiates remote loading to storage server
Request, load request information include user name, password, storage server address and remote operating system mirror image unique identification.
S4: storage server authenticates the username and password from the client for initiating remote loading request, recognizes
Card pass through after check the configuration file of operating system of user mirror image, and confirm client IP whether with by operation to be started system
The IP setting of system mirror image is consistent, such as consistent, then determines that user identity authentication is successful.
After user identity authentication success, remote loading operating system image instance to client is run, juxtaposition active user
For presence.
To sum up, the method for authenticating user identity suitable for transparent computing system of the invention no longer merely uses user
Name password, but the IP address for the client that operating system of user mirror image is used with user is bound together, use static state point
It, could remote loading operating system mirror only in IP address, MAC Address and all correct situation of user name password with IP mode
Picture example enhances the security reliability of transparent computing system to local runtime, to the corporate intranets user such as hospital, school, visitor
When family end runs operating system failure, it is easier to investigation and positioning.
It not only can be all in addition, realizing the rights management of user by transparent computing system Web authentication server
User provides unified service, additionally it is possible to provide some personalized services, such as each user for the user of different rights
There is a different bootable operating system lists etc., perfect user experience.
Embodiment 3:
Referring to Fig. 6, the system using the transparent computing system of the method for authenticating user identity of embodiment 1 or embodiment 2 is matched
Set method, comprising the following steps:
1) network configuration and user identity authentication pol-icy code are added in bootstrap NBP source code, and recompilate life
At NBP bootstrap;
2) the main boot subregion MBR under the BIOS mode on the hard disk of client is wiped, the NBP that compiling is generated guides journey
Sequence programming is to the former position main boot subregion MBR;
3) MySQL and the Tomcat service of certificate server are configured, and authentication background program is deployed in web authentication
On the Tomcat of server;
4) iSCSI service for configuring storage server, by operating system of user mirror image and user name and cryptographic binding, modification
The access authority of operating system mirror image, and the IP address being able to access that is set;
5) configuration file for modifying Dynamic Host Configuration Protocol server, distributes IP in a static manner, by the client of application transparent computing system
The physical address and IP at end are bound;
6) the operating system of user mirror image for making remote loading, modifies the network profile of each operating system nucleus,
By designated position of the operating system mirrored storage made in iSCSI configuration file.
Above-mentioned ' In System Reconfiguration Method, configuration are simply easily achieved;By user authentication policy module, it is difficult to reduce transplanting
Degree, expands the scope of application.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (3)
1. a kind of method for authenticating user identity suitable for transparent computing system, which is characterized in that including being logged in when user is switched on
When, execute following authenticating step:
S1: client obtains IP, the configuration file static allocation IP that Dynamic Host Configuration Protocol server is bound according to MAC and IP in a static manner;
S2: client send landing request information to certificate server, the landing request information include address of the authentication server,
Username and password;
S3: certificate server inquires background data base, obtains the bootable operating system permissions list of the user and text is written
This information is sent to client, and the text information includes user identifier, operating system quantity and OS name;
S4: user selects to want the operating system of remote loading by client, initiates remote loading request to storage server,
The load request information includes user name, password, storage server address and remote operating system mirror image unique identification;
S5: storage server authenticates the username and password from the client for initiating remote loading request, and certification is logical
Later check the configuration file of operating system of user mirror image, and confirm client IP whether with by operating system mirror to be started
The IP setting of picture is consistent, such as consistent, then determines user identity authentication success.
2. the method for authenticating user identity according to claim 1 suitable for transparent computing system, which is characterized in that described
In step S2 and S3, the client is communicated with the certificate server using http agreement;In the step S4 and S5,
The client is communicated with the storage server using iSCSI protocol.
3. a kind of using as claimed in claim 1 or 2 suitable for the transparent of the method for authenticating user identity of transparent computing system
The ' In System Reconfiguration Method of computing system, which comprises the following steps:
1) network configuration, user identity authentication pol-icy code are added in network boot NBP source code, and recompilate generation
NBP bootstrap;
2) the main boot subregion MBR under the BIOS mode on the hard disk of client is wiped, is replaced with the NBP bootstrap that compiling generates
Change former main boot subregion MBR;
3) MySQL and the Tomcat service of certificate server are configured, and authentication background program is deployed on Tomcat;
4) iSCSI service for configuring storage server, by operating system of user mirror image and user name and cryptographic binding, modification operation
The access authority of system image, and the IP address being able to access that is set;
5) configuration file for modifying Dynamic Host Configuration Protocol server, distributes IP in a static manner, by the client of application transparent computing system
Physical address and IP are bound;
6) the operating system of user mirror image for making remote loading, modifies the network profile of each operating system nucleus, will make
The position that the operating system mirrored storage performed is specified in iSCSI configuration file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611130519.7A CN106549976B (en) | 2016-12-09 | 2016-12-09 | A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611130519.7A CN106549976B (en) | 2016-12-09 | 2016-12-09 | A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106549976A CN106549976A (en) | 2017-03-29 |
CN106549976B true CN106549976B (en) | 2019-11-12 |
Family
ID=58397200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611130519.7A Active CN106549976B (en) | 2016-12-09 | 2016-12-09 | A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106549976B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107197373A (en) * | 2017-06-06 | 2017-09-22 | 深圳前海茂佳软件科技有限公司 | TV access right management method, TV and computer-readable recording medium |
CN107528918A (en) * | 2017-09-15 | 2017-12-29 | 湖南新云网科技有限公司 | Application program for mobile terminal management method and system based on lucidification disposal |
CN107707656A (en) * | 2017-10-10 | 2018-02-16 | 李梓彤 | The remote loading method and system of operating system |
CN110032414B (en) * | 2019-03-06 | 2023-06-06 | 联想企业解决方案(新加坡)有限公司 | Apparatus and method for secure user authentication in remote console mode |
CN111291429B (en) * | 2020-01-21 | 2023-04-25 | 李岗 | Data protection method and system |
CN115469878B (en) * | 2022-09-13 | 2023-11-24 | 上海掌御信息科技有限公司 | Android code diversity compiling method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1670698A (en) * | 2005-04-06 | 2005-09-21 | 清华大学 | Transparent computing based computing apparatus and method |
CN102610012A (en) * | 2012-02-14 | 2012-07-25 | 中国民航信息网络股份有限公司 | Common platform system and method of electronic boarding card |
CN102664958A (en) * | 2012-04-27 | 2012-09-12 | 中山大学 | Transparent computing system |
CN104166586A (en) * | 2014-09-04 | 2014-11-26 | 中南大学 | Transparent computing method and transparent computing system based on virtualization technology |
CN104363207A (en) * | 2014-10-29 | 2015-02-18 | 北京成众志科技有限公司 | Multi-factor security enhancement authorization and authentication method |
-
2016
- 2016-12-09 CN CN201611130519.7A patent/CN106549976B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1670698A (en) * | 2005-04-06 | 2005-09-21 | 清华大学 | Transparent computing based computing apparatus and method |
CN102610012A (en) * | 2012-02-14 | 2012-07-25 | 中国民航信息网络股份有限公司 | Common platform system and method of electronic boarding card |
CN102664958A (en) * | 2012-04-27 | 2012-09-12 | 中山大学 | Transparent computing system |
CN104166586A (en) * | 2014-09-04 | 2014-11-26 | 中南大学 | Transparent computing method and transparent computing system based on virtualization technology |
CN104363207A (en) * | 2014-10-29 | 2015-02-18 | 北京成众志科技有限公司 | Multi-factor security enhancement authorization and authentication method |
Non-Patent Citations (2)
Title |
---|
一种用于网络计算的可定制启动协议;周悦芝;《软件学报》;20031231;全文 * |
利用DHCP服务器分配静态IP地址;刘新向;《洛阳师范学院学报》;20050531;第4节 * |
Also Published As
Publication number | Publication date |
---|---|
CN106549976A (en) | 2017-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106549976B (en) | A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system | |
EP3353982B1 (en) | Using derived credentials for enrollment with enterprise mobile device management services | |
CN107172054B (en) | Authority authentication method, device and system based on CAS | |
US9154504B2 (en) | Device apparatus, control method, and relating storage medium | |
US8370905B2 (en) | Domain access system | |
US9026795B2 (en) | Apparatus and method for signing application | |
US20210314171A1 (en) | System and method for establishing dynamic trust credentials for network functions | |
US20200374121A1 (en) | Computing system and methods providing session access based upon authentication token with different authentication credentials | |
US10187386B2 (en) | Native enrollment of mobile devices | |
CN110417730B (en) | Unified access method of multiple application programs and related equipment | |
CN106257861A (en) | By controlling authentication method and the system thereof of equipment and auto communication | |
CA2951914C (en) | Restricted code signing | |
US20140150055A1 (en) | Data reference system and application authentication method | |
US10621335B2 (en) | Method and device for verifying security of application | |
CN103136478B (en) | A kind of method for managing security of terminal applies and system | |
CN111881483B (en) | Resource account binding method, device, equipment and medium based on blockchain | |
US20190098107A1 (en) | Geographic location based user computing asset provisioning in distributed computing systems | |
CN104348895A (en) | Method and device for sharing data among programs in mobile terminal | |
KR102063033B1 (en) | User terminal for using cloud service, integrated security management server of user terminal and method thereof | |
CN105814834B (en) | Push-based trust model for public cloud applications | |
US11681513B2 (en) | Controlled scope of authentication key for software update | |
CN104158812A (en) | Method and system of safety control of terminal application | |
CN114499977B (en) | Authentication method and device | |
CN105262754A (en) | Eyeball registration method and device | |
EP3143749B1 (en) | Restricted code signing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |