[go: up one dir, main page]

CN101917438A - Access control method and system in network communication system - Google Patents

Access control method and system in network communication system Download PDF

Info

Publication number
CN101917438A
CN101917438A CN2010102606056A CN201010260605A CN101917438A CN 101917438 A CN101917438 A CN 101917438A CN 2010102606056 A CN2010102606056 A CN 2010102606056A CN 201010260605 A CN201010260605 A CN 201010260605A CN 101917438 A CN101917438 A CN 101917438A
Authority
CN
China
Prior art keywords
client
identity information
access
server
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102606056A
Other languages
Chinese (zh)
Inventor
吴庆民
张会健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN2010102606056A priority Critical patent/CN101917438A/en
Publication of CN101917438A publication Critical patent/CN101917438A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

本发明提供一种在网络通信系统中访问控制方法和系统,解决现有技术中密码验证不合理的问题。所述方法,包括:在当检测到用户需要访问服务器时,客户端采用预先设置的自身的身份信息向所述服务器发起访问请求;所述服务器从预先记录的身份信息中,查找是否有该客户端的身份信息,并根据查找结果,对使用该客户端的用户进行访问控制。本发明提供的技术方案可应用于存储资源的访问控制。

The invention provides an access control method and system in a network communication system, which solves the problem of unreasonable password verification in the prior art. The method includes: when it is detected that the user needs to access the server, the client initiates an access request to the server with its own preset identity information; the server searches for the client from the pre-recorded identity information. The identity information of the client, and according to the search results, access control is performed on the user using the client. The technical solution provided by the invention can be applied to access control of storage resources.

Description

Access control method and system in network communicating system
Technical field
The present invention relates to field of computer, relate in particular to a kind of in network communicating system access control method and system.
Background technology
ISCSI (internet Small Computer System Interface, network minicomputer interface) has become a popular SAN solution in large enterprise and the medium-sized and small enterprises.Large enterprise is applied to these technology two wires and three-way data center and large-scale remote branch office usually.In medium-sized and small enterprises' environment, master data center and auxiliary data center and large-scale remote branch office all can use iSCSISANs (storage area network) usually.
The main applied environment of another of iSCSI is ASP's environment.Operate in the high-performance Ethernet structural, based on NFS (Network File System, NFS) NAS (Network Attached Storage: network attached storage) be generally in this field and occupy main flow, because most flow all is based on the flow of file.ISCSI has increased the seamless support to the application software of benefiting from SAN.Now, owing to increased virtual server software, these application software all expand among the cloud computing environment.
From current should being used for, iSCSI uses under the not many situation such as the front end main frame that mainly still concentrates on data center.Also there are some users to begin the iSCSI agreement is used for business data space management and no disc system.But the client terminal quantity of this type of application can be with ten thousand calculating, and this supports host number and rights management to have higher requirement just for the iSCSI agreement.
At present, storage system is at CHAP (Challenge Handshake Authentication Protocol, challenge handshake authentication protocol) during certification mode, this chap authentication has proposed a lot of requirements on password is selected, require the user that two passwords need be set, to be used for two-way communication, and the length of each password all is conditional, and the user need remember long password, in case misremember, just can't use storage resources, make troubles to use; If the user is not the data administrator of specialty, but common office worker is convenient simple relatively with password setting in order to remember probably, does not even establish password, can be because the low excessively problem that causes information leakage of the level of security of password have reduced the fail safe of storage system.
As seen from the above, to the irrational problem of authenticating user identification, be specially in the storage system: the password of user's input is long, the user is logined complicate; The password of user's input is simple, has the hidden danger of information leakage.
Summary of the invention
The invention provides a kind of in network communicating system access control method and system, solve the irrational problem of password authentification in the prior art.
For solving the problems of the technologies described above, the invention provides following technical scheme:
A kind of in network communicating system access control method, comprising:
When detecting the user and need access server, customer end adopted sets in advance, and the identity information of self is initiated access request to described server;
Described server is searched the identity information whether this client is arranged from the identity information that writes down in advance, and according to lookup result, to using the user access control of this client.
Further, described method also has following characteristics: described customer end adopted sets in advance the identity information of self also comprised before described server is initiated access request:
Described client generates the identity information of self according to the generation strategy that sets in advance, and the identity information that generates is notified to described server.
Further, described method also has following characteristics:
The identity information of described client is to determine according to the configuration descriptor of self hardware, and the configuration descriptor of wherein said self hardware comprises in the sequence number of CPU, hard disk, internal memory, mainboard and network interface card of personal computer at least one.
Further, described method also has following characteristics: described server, comprising using the user access control of this client according to lookup result:
If find, then according to the identity information of this client that sets in advance and the corresponding relation of access rights, for the user who uses this client provides this client identity information pairing access rights.
Further, described method also has following characteristics:
If described client has at least two users that access rights are different, then when described server sends described access request, described client is also to the described user's of described server notification identity information;
Described destination end is determined whole access rights of the identity information correspondence of this client according to the identity information of client, pairing access rights during with this client-access according to this user's the identity information of record in advance again, from these whole access rights, determine the final access rights of this user's identity information correspondence, and provide service for described user according to described final access rights.
A kind of in network communicating system access control system, comprise client and server, wherein:
Described client is used for when detecting the user and need visit described server, adopts self the identity information that sets in advance to initiate access request to described server;
Described server is used for searching the identity information whether this client is arranged, and according to lookup result, to using the user access control of this client from the identity information of record in advance.
Further, described system also has following characteristics: described client also comprises:
Generation module, self the identity information that is used for setting in advance in employing according to the generation strategy that sets in advance, generated the identity information of self before described server is initiated access request;
Notification module, the identity information that is used for generating is notified to described server.
Further, described system also has following characteristics:
The identity information of described client is to determine according to the configuration descriptor of self hardware, and the configuration descriptor of wherein said self hardware comprises in the sequence number of CPU, hard disk, internal memory, mainboard and network interface card of personal computer at least one.
Further, described system also has following characteristics: described server comprises:
Search module, be used for from advance the record identity information, search the identity information whether this client is arranged;
Control module is if be used for finding, according to the identity information of this client that sets in advance and the corresponding relation of access rights, for the user who uses this client provides this client identity information pairing access rights.
Further, described system also has following characteristics:
Described client also is used in this locality at least two users that access rights are different being arranged, when described server sends described access request, also to the described user's of described server notification identity information;
Described server, also be used for determining whole access rights of the identity information correspondence of this client according to the identity information of client, pairing access rights during with this client-access according to this user's the identity information of record in advance again, from these whole access rights, determine the final access rights of this user's identity information correspondence, and provide service for described user according to described final access rights.
Technical scheme provided by the invention adopts the identity information of client to carry out authentication, reaches the purpose of authentication, and need not the long password of user's input, uses the identity information of client to finish authentication automatically, reduces user's operating pressure.
Description of drawings
Fig. 1 be provided by the invention a kind of in network communicating system the structural representation of access control system;
Fig. 2 is the structural representation of client 11 among the system shown in Figure 1 embodiment;
Fig. 3 is the structural representation of server 12 among the system shown in Figure 1 embodiment;
Fig. 4 be provided by the invention a kind of in network communicating system the schematic flow sheet of access control method embodiment.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with the accompanying drawings and the specific embodiments.
Fig. 1 be provided by the invention a kind of in network communicating system the structural representation of access control system.System shown in Figure 1 comprises client 11 and server 12, wherein:
Described client 11 is used for when detecting the user and need visit described server 12, adopts self the identity information that sets in advance to initiate access request to described server 12;
Described server 12 is used for searching the identity information whether this client 11 is arranged, and according to lookup result, to using the user access control of this client 11 from the identity information of record in advance.
Fig. 2 is the structural representation of client 11 among the system shown in Figure 1 embodiment.Client 11 shown in Figure 2 also comprises generation module 111 and communication module 112, wherein:
Described generation module, self the identity information that is used for setting in advance in employing according to the generation strategy that sets in advance, generated the identity information of self before described server is initiated access request;
Notification module, the identity information that is used for generating is notified to described server.
In like manner, if server has generated the identity information of this client for each client, then server can send to clients corresponding with the identity information that generates.
The identity information of described client is to determine according to the configuration descriptor of self hardware, and the configuration descriptor of wherein said self hardware comprises in the sequence number of CPU, hard disk, internal memory, mainboard and network interface card of client at least one.
For example, set in advance a calculation expression, the numeral in one or more hardware description information and this calculation expression of alphabetical substitution are obtained one section code, the identity information of this code as client.All right other algorithms as hashing algorithm, coding being provided from the information sequence that is provided constituting identity information.
Because the hardware description information of any two personal computers all is inequality, so, can both clearly distinguish different clients if adopting configuration descriptor result calculated with a kind of calculation expression and same hardware is inequality in twos.Need not to generate and be used to calculate the information sequence of identity information increasing hardware, saved the cost of hardware.
Wherein adopt client to generate the identity information of self, flow process is simple, promptly need not to report to server the hardware configuration descriptor of self, and adopts server to generate the identity information of client, is convenient to the active management of destination end.
Server 12 if find, determines that then this user's authentication is passed through when the identity information of this personal computer, this user is a validated user, allows for this user storage resources is provided; Otherwise this user's authentication is not passed through after determining, this user is the disabled user, and refusing provides storage resources for this user.
Fig. 3 is the structural representation of server 12 among the system shown in Figure 1 embodiment.Destination end shown in Figure 3 comprises searches module 121 and control module 122, wherein:
Search module 121, be used for from advance the record identity information, search the identity information whether this client 11 is arranged;
Control module 122 is if be used for finding, according to the identity information of this client 11 that sets in advance and the corresponding relation of access rights, for the user who uses this client 11 provides these client 11 identity informations pairing access rights.
Wherein access rights can identify with the address realm of memory space or system in other are divided the address designation that disposes behind addresses and come mark, can certainly identify with the filename that allows visit.
Generally, the use user of each client is fixed as a people usually, so as long as server is set up corresponding relation with the identity information of this client with the user's who uses this client access rights, and when personal computer has the different user of at least two access rights, in order clearly to distinguish user's access rights, need carry out following processing:
Described client also is used in this locality at least two users that access rights are different being arranged, when described server sends described access request, also to the described user's of described server notification identity information;
Described server, also be used for determining whole access rights of the identity information correspondence of this client according to the identity information of client, pairing access rights during with this client-access according to this user's the identity information of record in advance again, from these whole access rights, determine the final access rights of this user's identity information correspondence, and provide service for described user according to described final access rights.
In the present embodiment, client replaces the identity information that the user imports in the prior art by the identity information of self, finish authentication with server, make after client is by authentication, the user gets final product successful access, need not the authentication information that the user remembers the access destination end, finish authentication automatically, realize fast access user's self storage resources.
Wherein above-mentioned access control system can specifically be applied in the storage system, and in storage system, client is a personal computer, and server is a storage device.Certainly, also can be other communication systems, it is the mode of the communication mode employing client-server of network, and client use mode as special messenger's special plane, be that every employed user of client fixes, as PC in the company etc., for example be applied in the scene of mailbox login system, forum's login system.
System embodiment provided by the invention adopts the identity information of client to carry out authentication, reaches the purpose of authentication, and need not the long password of user's input, uses the identity information of client to finish authentication automatically, reduces user's operating pressure.
Fig. 4 be provided by the invention a kind of in network communicating system the schematic flow sheet of access control method embodiment.In conjunction with the system embodiment shown in Fig. 1~3, method embodiment shown in Figure 4 comprises:
Step 401, when detecting the user and need access server, customer end adopted sets in advance, and the identity information of self is initiated access request to described server;
Step 402, described server are searched the identity information whether this client is arranged from the identity information that writes down in advance;
Step 403, described server are according to lookup result, to using the user access control of this client.
Below method embodiment provided by the invention is described further:
Wherein before step 401, described method also comprises the steps:
Described client generates the identity information of self according to the generation strategy that sets in advance, and the identity information that generates is notified to described server.
Further, the identity information of described client is to determine according to the configuration descriptor of self hardware, and the configuration descriptor of wherein said self hardware comprises in the sequence number of CPU, hard disk, internal memory, mainboard and network interface card of personal computer at least one.
Wherein step 403 specifically comprises:
If find, then according to the identity information of this client that sets in advance and the corresponding relation of access rights, for the user who uses this client provides this client identity information pairing access rights.
Further, described method also comprises:
If described client has at least two users that access rights are different, then when described server sends described access request, described client is also to the described user's of described server notification identity information;
Described destination end is determined whole access rights of the identity information correspondence of this client according to the identity information of client, pairing access rights during with this client-access according to this user's the identity information of record in advance again, from these whole access rights, determine the final access rights of this user's identity information correspondence, and provide service for described user according to described final access rights.
Wherein above-mentioned access control method can specifically be applied in the storage system, and in storage system, client is a personal computer, and server is a storage device.Certainly, also can be other communication systems, it is the mode of the communication mode employing client-server of network, and client use mode as special messenger's special plane, be that every employed user of client fixes, as PC in the company etc., for example be applied in the scene of mailbox login system, forum's login system.
Method embodiment provided by the invention adopts the identity information of client to carry out authentication, reaches the purpose of authentication, and need not the long password of user's input, uses the identity information of client to finish authentication automatically, reduces user's operating pressure.
The all or part of step that the one of ordinary skill in the art will appreciate that the foregoing description program circuit that can use a computer is realized, described computer program can be stored in the computer-readable recording medium, described computer program (as system, unit, device etc.) on the relevant hardware platform is carried out, when carrying out, comprise one of step or its combination of method embodiment.
Alternatively, all or part of step of the foregoing description also can use integrated circuit to realize, these steps can be made into integrated circuit modules one by one respectively, perhaps a plurality of modules in them or step is made into the single integrated circuit module and realizes.Like this, the present invention is not restricted to any specific hardware and software combination.
Each device/functional module/functional unit in the foregoing description can adopt the general calculation device to realize, they can concentrate on the single calculation element, also can be distributed on the network that a plurality of calculation element forms.
Each device/functional module/functional unit in the foregoing description is realized with the form of software function module and during as independently production marketing or use, can be stored in the computer read/write memory medium.The above-mentioned computer read/write memory medium of mentioning can be a read-only memory, disk or CD etc.
The above; only be the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the described protection range of claim.

Claims (10)

1.一种在网络通信系统中访问控制方法,其特征在于,包括:1. An access control method in a network communication system, characterized in that, comprising: 在当检测到用户需要访问服务器时,客户端采用预先设置的自身的身份信息向所述服务器发起访问请求;When it is detected that the user needs to access the server, the client initiates an access request to the server using the preset identity information of itself; 所述服务器从预先记录的身份信息中,查找是否有该客户端的身份信息,并根据查找结果,对使用该客户端的用户进行访问控制。The server searches for the identity information of the client from the pre-recorded identity information, and performs access control on the user using the client according to the search result. 2.根据权利要求1所述的方法,其特征在于,所述客户端采用预先设置的自身的身份信息向所述服务器发起访问请求之前,还包括:2. The method according to claim 1, wherein before the client initiates an access request to the server using its preset identity information, it further includes: 所述客户端根据预先设置的生成策略,生成自身的身份信息,并将生成的身份信息通知给所述服务器。The client generates its own identity information according to a preset generation strategy, and notifies the server of the generated identity information. 3.根据权利要求1或2所述的方法,其特征在于,3. The method according to claim 1 or 2, characterized in that, 所述客户端的身份信息是根据自身硬件的配置描述信息确定的,其中所述自身硬件的配置描述信息包括个人计算机的CPU、硬盘、内存、主板和网卡的序列号中至少一个。The identity information of the client is determined according to the configuration description information of its own hardware, wherein the configuration description information of its own hardware includes at least one of the serial numbers of the CPU, hard disk, memory, motherboard and network card of the personal computer. 4.根据权利要求1所述的方法,其特征在于,所述服务器根据查找结果,对使用该客户端的用户进行访问控制,包括:4. The method according to claim 1, wherein the server performs access control on the user using the client according to the search result, including: 如果查找到,则根据预先设置的该客户端的身份信息与访问权限的对应关系,为使用该客户端的用户提供该客户端身份信息所对应的访问权限。If it is found, according to the preset correspondence between the identity information of the client and the access authority, the user using the client is provided with the access authority corresponding to the identity information of the client. 5.根据权利要求4所述的方法,其特征在于,5. The method of claim 4, wherein, 如果所述客户端有至少两个访问权限不同的用户,则在向所述服务器发送所述访问请求时,所述客户端还向所述服务器通知所述用户的身份信息;If the client has at least two users with different access rights, when sending the access request to the server, the client also notifies the server of the identity information of the users; 所述目标端根据客户端的身份信息确定该客户端的身份信息对应的全部访问权限,再根据预先记录的该用户的身份信息以该客户端访问时所对应的访问权限,从该全部访问权限中确定该用户的身份信息对应的最终访问权限,并根据所述最终访问权限为所述用户提供服务。The target end determines all access rights corresponding to the client's identity information according to the client's identity information, and then determines from the total access rights based on the pre-recorded user's identity information and the corresponding access rights when the client accesses. The user's identity information corresponds to the final access right, and provides services for the user according to the final access right. 6.一种在网络通信系统中访问控制系统,其特征在于,包括客户端和服务器,其中:6. An access control system in a network communication system, comprising a client and a server, wherein: 所述客户端,用于在当检测到用户需要访问所述服务器时,采用预先设置的自身的身份信息向所述服务器发起访问请求;The client is configured to initiate an access request to the server using its own preset identity information when detecting that the user needs to access the server; 所述服务器,用于从预先记录的身份信息中,查找是否有该客户端的身份信息,并根据查找结果,对使用该客户端的用户进行访问控制。The server is used to search whether there is the identity information of the client from the pre-recorded identity information, and perform access control on the user using the client according to the search result. 7.根据权利要求6所述的系统,其特征在于,所述客户端还包括:7. The system according to claim 6, wherein the client further comprises: 生成模块,用于在采用预先设置的自身的身份信息向所述服务器发起访问请求之前,根据预先设置的生成策略,生成自身的身份信息;A generating module, configured to generate its own identity information according to a preset generation strategy before using the preset own identity information to initiate an access request to the server; 通知模块,用于将生成的身份信息通知给所述服务器。A notification module, configured to notify the server of the generated identity information. 8.根据权利要求6或7所述的系统,其特征在于:8. The system according to claim 6 or 7, characterized in that: 所述客户端的身份信息是根据自身硬件的配置描述信息确定的,其中所述自身硬件的配置描述信息包括个人计算机的CPU、硬盘、内存、主板和网卡的序列号中至少一个。The identity information of the client is determined according to the configuration description information of its own hardware, wherein the configuration description information of its own hardware includes at least one of the serial numbers of the CPU, hard disk, memory, motherboard and network card of the personal computer. 9.根据权利要求6所述的系统,其特征在于,所述服务器包括:9. The system according to claim 6, wherein the server comprises: 查找模块,用于从预先记录的身份信息中,查找是否有该客户端的身份信息;A search module, configured to search for the client's identity information from the pre-recorded identity information; 控制模块,用于如果查找到,根据预先设置的该客户端的身份信息与访问权限的对应关系,为使用该客户端的用户提供该客户端身份信息所对应的访问权限。The control module is configured to, if found, provide the user using the client with the access permission corresponding to the client identity information according to the preset correspondence between the client identity information and the access permission. 10.根据权利要求9所述的系统,其特征在于,10. The system of claim 9, wherein: 所述客户端,还用于在本地有至少两个访问权限不同的用户,在向所述服务器发送所述访问请求时,还向所述服务器通知所述用户的身份信息;The client is further configured to have at least two local users with different access rights, and to notify the server of the identity information of the users when sending the access request to the server; 所述服务器,还用于根据客户端的身份信息确定该客户端的身份信息对应的全部访问权限,再根据预先记录的该用户的身份信息以该客户端访问时所对应的访问权限,从该全部访问权限中确定该用户的身份信息对应的最终访问权限,并根据所述最终访问权限为所述用户提供服务。The server is further configured to determine all access rights corresponding to the client's identity information according to the client's identity information, and then use the access rights corresponding to the client's access according to the pre-recorded user's identity information to access all access rights from the client. The authority determines the final access authority corresponding to the user's identity information, and provides services for the user according to the final access authority.
CN2010102606056A 2010-08-23 2010-08-23 Access control method and system in network communication system Pending CN101917438A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102606056A CN101917438A (en) 2010-08-23 2010-08-23 Access control method and system in network communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102606056A CN101917438A (en) 2010-08-23 2010-08-23 Access control method and system in network communication system

Publications (1)

Publication Number Publication Date
CN101917438A true CN101917438A (en) 2010-12-15

Family

ID=43324822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102606056A Pending CN101917438A (en) 2010-08-23 2010-08-23 Access control method and system in network communication system

Country Status (1)

Country Link
CN (1) CN101917438A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098317A (en) * 2011-03-22 2011-06-15 浙江中控技术股份有限公司 Data transmitting method and system applied to cloud system
CN104021351A (en) * 2014-05-28 2014-09-03 宇龙计算机通信科技(深圳)有限公司 Method and device for data resource access
CN104363229A (en) * 2014-11-14 2015-02-18 浪潮(北京)电子信息产业有限公司 Data center and access method thereof
CN106161467A (en) * 2016-08-31 2016-11-23 成都九鼎瑞信科技股份有限公司 Water utilities data access method and device
CN107180172A (en) * 2017-04-19 2017-09-19 上海海加网络科技有限公司 A kind of IPSAN access control methods and device based on USBKey digital certificate authentications
CN108287894A (en) * 2018-01-19 2018-07-17 腾讯科技(深圳)有限公司 Data processing method, device, computing device and storage medium
CN112532561A (en) * 2019-08-28 2021-03-19 斑马智行网络(香港)有限公司 Method, device, system and storage medium for realizing access between devices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003186831A (en) * 2001-12-13 2003-07-04 Sony Corp Network system, information processing device and method, recording medium, and program
US20040103097A1 (en) * 1995-12-14 2004-05-27 Wesinger Ralph E. Automated on-line information service and directory, particularly for the World Wide Web
CN1703004A (en) * 2005-02-28 2005-11-30 联想(北京)有限公司 Method for implementing network access authentication
CN100464548C (en) * 2005-10-10 2009-02-25 广东省电信有限公司研究院 System and method for blocking worm attack

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103097A1 (en) * 1995-12-14 2004-05-27 Wesinger Ralph E. Automated on-line information service and directory, particularly for the World Wide Web
JP2003186831A (en) * 2001-12-13 2003-07-04 Sony Corp Network system, information processing device and method, recording medium, and program
CN1703004A (en) * 2005-02-28 2005-11-30 联想(北京)有限公司 Method for implementing network access authentication
CN100464548C (en) * 2005-10-10 2009-02-25 广东省电信有限公司研究院 System and method for blocking worm attack

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098317A (en) * 2011-03-22 2011-06-15 浙江中控技术股份有限公司 Data transmitting method and system applied to cloud system
CN102098317B (en) * 2011-03-22 2013-12-18 浙江中控技术股份有限公司 Data transmitting method and system applied to cloud system
CN104021351A (en) * 2014-05-28 2014-09-03 宇龙计算机通信科技(深圳)有限公司 Method and device for data resource access
CN104021351B (en) * 2014-05-28 2017-11-17 宇龙计算机通信科技(深圳)有限公司 The access method and device of a kind of data resource
CN104363229A (en) * 2014-11-14 2015-02-18 浪潮(北京)电子信息产业有限公司 Data center and access method thereof
CN106161467A (en) * 2016-08-31 2016-11-23 成都九鼎瑞信科技股份有限公司 Water utilities data access method and device
CN107180172A (en) * 2017-04-19 2017-09-19 上海海加网络科技有限公司 A kind of IPSAN access control methods and device based on USBKey digital certificate authentications
CN108287894A (en) * 2018-01-19 2018-07-17 腾讯科技(深圳)有限公司 Data processing method, device, computing device and storage medium
CN108287894B (en) * 2018-01-19 2023-06-23 腾讯科技(深圳)有限公司 Data processing method, device, computing equipment and storage medium
CN112532561A (en) * 2019-08-28 2021-03-19 斑马智行网络(香港)有限公司 Method, device, system and storage medium for realizing access between devices

Similar Documents

Publication Publication Date Title
US9961053B2 (en) Detecting compromised credentials
JP5698539B2 (en) System and method for delegating access to an online account
US12199988B2 (en) Proxy authorization of a network device
US10282522B2 (en) Cross-application authentication on a content management system
US10447610B1 (en) Techniques for network redirection
RU2463652C2 (en) Extensible and programmable multi-tenant service architecture
US10757107B2 (en) Application-assisted login for a web browser
CN106796632B (en) Remote access control to stored data
US20140181116A1 (en) Method and device of cloud storage
CN101917438A (en) Access control method and system in network communication system
CN103995674B (en) Access request processing method, device and equipment
CN104205723A (en) Identity services for organizations transparently hosted in the cloud
JP6096376B2 (en) Access control method, apparatus, program, and recording medium
CN109542862B (en) Method, device and system for controlling mounting of file system
CN108241797A (en) Mirror warehouse user rights management method, device, system and readable storage medium
CN101335765A (en) Storage Service Middleware Based on Mobile Cache
US10218659B1 (en) Persistent connections for email web applications
WO2014067284A1 (en) Cross-domain controller authentication method, apparatus, and host
CN116569538A (en) Service-to-service communication and authentication via a central network mesh
CN102882933B (en) A kind of encryption cloud storage system
CN105637471B (en) Method and device for monitoring and controlling a storage environment
US10033732B1 (en) Systems and methods for detecting cloning of security tokens
US10985998B1 (en) Domain controller configurability for directories
CN107566329A (en) A kind of access control method and device
US9621349B2 (en) Apparatus, method and computer-readable medium for user authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20101215