[go: up one dir, main page]

CN105488378A - Method for portably, independently and securely accessing to remote server - Google Patents

Method for portably, independently and securely accessing to remote server Download PDF

Info

Publication number
CN105488378A
CN105488378A CN201510795847.8A CN201510795847A CN105488378A CN 105488378 A CN105488378 A CN 105488378A CN 201510795847 A CN201510795847 A CN 201510795847A CN 105488378 A CN105488378 A CN 105488378A
Authority
CN
China
Prior art keywords
browser
remote server
portable medium
portable
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510795847.8A
Other languages
Chinese (zh)
Inventor
聂磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201510795847.8A priority Critical patent/CN105488378A/en
Publication of CN105488378A publication Critical patent/CN105488378A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for portably, independently and securely accessing to a remote server. The method comprises: starting an operating system in a portable medium by utilizing a computer to run a browser in the portable medium; and verifying access information through the browser in the portable medium, and after the verification is successful, connecting the remote server by utilizing the browser in the portable medium, thereby successfully accessing to the remote server. According to the method, the security of accessing to the remote server is improved.

Description

一种便携式独立安全访问远程服务器的方法A Portable Standalone Secure Access to Remote Servers

技术领域technical field

本发明涉及计算机系统技术领域,特别是涉及一种便携式独立安全访问远程服务器的方法。The invention relates to the technical field of computer systems, in particular to a method for portable independent safe access to a remote server.

背景技术Background technique

目前,随着网络技术的进步,现在任何位置都可以访问各种电子账户或网上银行,但是随着技术进步也有技术缺陷,在网上进行访问时,也会给病毒侵入系统的机会。例如,某些机场和其他设施配备公共计算机终端允许单独访问互联网,通常,需要通过一个终端访问互联网或其他计算机来建立互联网账户和所需的访问信息,具体是访问终端通过账号和密码访问远程服务器。At present, with the advancement of network technology, various electronic accounts or online banking can be accessed from any location. However, with the advancement of technology, there are also technical defects. When accessing online, there will also be opportunities for viruses to invade the system. For example, some airports and other facilities are equipped with public computer terminals to allow independent access to the Internet. Usually, a terminal needs to be used to access the Internet or other computers to establish Internet accounts and required access information. Specifically, access terminals access remote servers through account numbers and passwords .

在计算机终端与远程服务器进行通信的过程中,计算机终端上设置有浏览器和操作系统,用于在互联网上建立与远程服务器的连接。但是计算机终端上的操作系统容易被黑客操纵。黑客可以通过修改计算机终端上的浏览器得代理设置,使用户的通信信息被合法服务器重定向到一个骗子服务器。如果在用户使用计算机终端访问合法服务器的过程中,代理服务器设置已经被黑客操纵连接,则计算机终端可能会被重定向到骗子服务器而不是合法的服务器,如果浏览器设置已被操纵,骗子服务器已经被黑客添加到受信任的服务器列表,它将成功地对计算机终端进行身份验证,这样用户发送的任何信息都会被骗子服务器通过安全连接获取,一旦取得连接可以断开骗子服务器通过中继冒名顶替的一些典型错误消息或回应其受害用户所需要的信息。这样黑客可以利用修改浏览器来接受未经授权的证书发布服务器作为受信任的证书合法服务器,时时能够获取用户在计算机终端上与远程服务器进行通信的信息。During the communication between the computer terminal and the remote server, the computer terminal is provided with a browser and an operating system for establishing a connection with the remote server on the Internet. But the operating system on the computer terminal is easily manipulated by hackers. Hackers can modify the proxy settings of the browser on the computer terminal, so that the user's communication information is redirected to a fraudulent server by a legitimate server. If the proxy server settings have been manipulated by hackers during the process of users accessing legitimate servers using computer terminals, computer terminals may be redirected to fraudulent servers instead of legitimate servers. If browser settings have been manipulated, fraudulent servers have been manipulated Added to the list of trusted servers by the hacker, it will successfully authenticate the computer terminal, so that any information sent by the user will be obtained by the liar server through a secure connection, and once the connection is obtained, the liar server can be disconnected by relaying impostors Some typical error messages or information needed to respond to their victims. In this way, hackers can modify the browser to accept the unauthorized certificate issuing server as a trusted certificate server, and can always obtain the information that the user communicates with the remote server on the computer terminal.

可见,浏览器通常是安装在计算机终端,用来提供访问各种网站的功能,黑客通过操纵计算机终端上的浏览器的配置中的某些默认值,可以获得用户输入由访问高度敏感的信息,这样的计算机终端容易遭受黑客的攻击,因此访问远程服务器的安全性不高。It can be seen that browsers are usually installed on computer terminals to provide access to various websites. Hackers can obtain highly sensitive information entered by users by manipulating certain default values in the configuration of browsers on computer terminals. Such computer terminals are vulnerable to hackers, so access to remote servers is not very secure.

发明内容Contents of the invention

本发明的目的是提供一种便携式独立安全访问远程服务器的方法,以实现提高访问远程服务器的安全性。The purpose of the present invention is to provide a portable and independent method for securely accessing a remote server, so as to improve the security of accessing the remote server.

为解决上述技术问题,本发明提供一种便携式独立安全访问远程服务器的方法,该方法包括:In order to solve the above-mentioned technical problems, the present invention provides a method for portable independent secure access to a remote server, the method comprising:

利用计算机启动便携式介质中的操作系统,运行便携式介质中的浏览器;Using a computer to start the operating system in the portable medium and run the browser in the portable medium;

通过便携式介质中的浏览器对访问信息进行验证,验证成功之后利用便携式介质中的浏览器连接远程服务器,成功访问远程服务器。The access information is verified through the browser in the portable medium, and after successful verification, the browser in the portable medium is used to connect to the remote server, and the remote server is successfully accessed.

优选的,所述访问信息包括用户名信息和密码信息。Preferably, the access information includes user name information and password information.

优选的,所述便携式介质包括软盘或者内存卡。Preferably, the portable medium includes a floppy disk or a memory card.

优选的,所述操作系统和所述浏览器存储于所述便携式介质中。Preferably, the operating system and the browser are stored in the portable medium.

优选的,所述便携式介质中还存储有电子邮件客户端。Preferably, an email client is also stored in the portable medium.

优选的,所述电子邮件客户端用于接收用户输入的邮件访问信息,将邮件访问信息发送至远程服务器。Preferably, the email client is used to receive email access information input by the user, and send the email access information to the remote server.

优选的,所述成功访问远程服务器之后,还包括:Preferably, after the successful access to the remote server, it also includes:

所述浏览器和远程服务器之间建立通信链路,将浏览器中用户输入的通信信息传输至远程服务器A communication link is established between the browser and the remote server, and the communication information input by the user in the browser is transmitted to the remote server

本发明所提供的一种便携式独立安全访问远程服务器的方法,利用计算机启动便携式介质中的操作系统,运行便携式介质中的浏览器;通过便携式介质中的浏览器对访问信息进行验证,验证成功之后利用便携式介质中的浏览器连接远程服务器,成功访问远程服务器。可见,操作系统和浏览器都是设置在便携式介质中,浏览器设置在便携式介质中,通过便携式介质里的浏览器来连接远程服务器,由于浏览器存储在便携式介质中,黑客无法攻击便携带介质,进而无法攻击位于便携带介质中的浏览器,无法修改浏览器中的默认设置来操作浏览器,也就无法获取用户访问远程客户端的通信信息,因此该方法将浏览器和操作系统设置在便携式介质中,利用便携式介质中的浏览器来连接远程服务器,避免了黑客的恶意攻击,提高访问远程服务器的安全性。A portable, independent and secure method for accessing a remote server provided by the present invention uses a computer to start the operating system in the portable medium and run the browser in the portable medium; the access information is verified through the browser in the portable medium, and after successful verification Use the browser in the portable medium to connect to the remote server, and successfully access the remote server. It can be seen that both the operating system and the browser are set in the portable medium, and the browser is set in the portable medium, and the remote server is connected through the browser in the portable medium. Since the browser is stored in the portable medium, hackers cannot attack the portable medium , and then cannot attack the browser located in the portable medium, cannot modify the default settings in the browser to operate the browser, and cannot obtain the communication information of the user accessing the remote client, so this method sets the browser and operating system in a portable medium In the medium, the browser in the portable medium is used to connect to the remote server, which avoids malicious attacks of hackers and improves the security of accessing the remote server.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only It is an embodiment of the present invention, and those skilled in the art can also obtain other drawings according to the provided drawings without creative work.

图1为本发明所提供的一种便携式独立安全访问远程服务器的方法的流程图。FIG. 1 is a flow chart of a method for portable independent secure access to a remote server provided by the present invention.

具体实施方式detailed description

本发明的核心是提供一种便携式独立安全访问远程服务器的方法,以实现提高访问远程服务器的安全性。The core of the invention is to provide a method for portable, independent and secure access to a remote server, so as to improve the security of accessing the remote server.

为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

请参考图1,图1为本发明所提供的一种便携式独立安全访问远程服务器的方法的流程图,该方法包括:Please refer to Fig. 1, Fig. 1 is a flow chart of a method for a portable independent secure access remote server provided by the present invention, the method includes:

S11:利用计算机启动便携式介质中的操作系统,运行便携式介质中的浏览器;S11: using the computer to start the operating system in the portable medium, and run the browser in the portable medium;

其中,所述访问信息包括用户名信息和密码信息。这些访问信息是用户对远程终端进行访问时在浏览器中输入的用户名信息和密码信息。将操作系统和浏览器存储在便携式介质中,然后利用计算机启动便携式介质中的操作系统,运行便携式介质中的浏览器Wherein, the access information includes user name information and password information. These access information are user name information and password information entered in the browser when the user accesses the remote terminal. Store the operating system and browser in portable media, and then use the computer to start the operating system in the portable media and run the browser in the portable media

其中,所述便携式介质包括软盘或者内存卡。所述操作系统和所述浏览器存储于所述便携式介质中。即用来访问远程服务器的浏览器和操作系统均存储在便携式介质中,例如存储在软盘或者内存卡中,更具体的,可以将浏览器和操作系统存储在闪存内存卡中。Wherein, the portable medium includes a floppy disk or a memory card. The operating system and the browser are stored in the portable medium. That is, the browser and the operating system used to access the remote server are stored in portable media, such as a floppy disk or a memory card. More specifically, the browser and the operating system can be stored in a flash memory card.

S12:通过便携式介质中的浏览器对访问信息进行验证,验证成功之后利用便携式介质中的浏览器连接远程服务器,成功访问远程服务器。S12: Verify the access information through the browser in the portable medium, and use the browser in the portable medium to connect to the remote server after the verification is successful, and successfully access the remote server.

其中,由便携式介质中的浏览器接收用户输入的访问信息,浏览器对访问信息进行验证,验证成功后浏览器才能与远程服务器进行连接,若验证失败,则浏览器无法与远程服务器进行连接,无法再进行通信。Wherein, the browser in the portable medium receives the access information input by the user, and the browser verifies the access information. Only after the verification is successful, the browser can connect to the remote server; if the verification fails, the browser cannot connect to the remote server. Can no longer communicate.

其中,所述便携式介质中还存储有电子邮件客户端。所述电子邮件客户端用于接收用户输入的邮件访问信息,将邮件访问信息发送至远程服务器。便携式存储介质中存储有浏览器和操作系统,还能存储电子邮件客户端,也还能存储其它通信程序软件。Wherein, an email client is also stored in the portable medium. The email client is used to receive the email access information input by the user, and send the email access information to the remote server. The portable storage medium stores a browser and an operating system, and can also store an email client, and can also store other communication program software.

其中,所述成功访问远程服务器之后,所述浏览器和远程服务器之间建立通信链路,将浏览器中用户输入的通信信息传输至远程服务器。浏览器连接到远程服务器,与远程服务器之间建立通信链路,将用户需要访问到远程服务器,与远程服务器之间进行通信的通信信息传送至远程服务器,成功进行通信连接。Wherein, after the successful access to the remote server, a communication link is established between the browser and the remote server, and the communication information input by the user in the browser is transmitted to the remote server. The browser connects to the remote server, establishes a communication link with the remote server, transmits the communication information that the user needs to access the remote server and communicate with the remote server to the remote server, and successfully establishes the communication connection.

操作系统和浏览器都是设置在便携式介质中,浏览器设置在便携式介质中,通过便携式介质里的浏览器来连接远程服务器,由于浏览器存储在便携式介质中,黑客无法攻击便携带介质,进而无法攻击位于便携带介质中的浏览器,无法修改浏览器中的默认设置来操作浏览器,也就无法获取用户访问远程客户端的通信信息,提高访问远程服务器的安全性。Both the operating system and the browser are set in the portable medium, the browser is set in the portable medium, and the remote server is connected through the browser in the portable medium. Since the browser is stored in the portable medium, hackers cannot attack the portable medium, and then It cannot attack the browser located in the portable medium, cannot modify the default settings in the browser to operate the browser, and cannot obtain the communication information of the user accessing the remote client, improving the security of accessing the remote server.

具体的,浏览器和操作系统都存储在便携式介质中,是在一个使用受保护和独立的环境中,可以把这种便携式介质和浏览器、操作系统看作一种计算机关系系统。更具体的,可以把操作系统存储在第一个媒介,第一个媒介是存储系统软件的存储介质,第一个媒介包括可引导软盘,可以把浏览器存储在第二个媒介中,第二个媒介是闪存,具体是闪存内存卡。操作系统为Linux操作系统,浏览器是一个系统软件,系统软件是一个互联网浏览器应用程序。Specifically, both the browser and the operating system are stored in a portable medium in a protected and independent environment, and this portable medium, browser, and operating system can be regarded as a computer relationship system. More specifically, the operating system can be stored in the first medium, the first medium is a storage medium for storing system software, the first medium includes a bootable floppy disk, the browser can be stored in the second medium, and the second medium The first medium is flash memory, specifically a flash memory card. The operating system is a Linux operating system, the browser is a system software, and the system software is an Internet browser application program.

计算机中有计算机可读的程序代码功能,并配置为访问远程服务器。配置计算机使计算机重新启动存储在便携式引导介质上的受保护和独立的操作系统,所述操作系统包括系统文件和驱动程序,需要识别和管理。利用计算机启动便携式介质中的操作系统,运行便携式介质中的浏览器。配置计算机使安全独立的便携式介质中的浏览器访问远程服务器,便携式介质中存储有系统软件,系统软件包括浏览器、通信和连接软件。The computer contains computer readable program code functions and is configured to access the remote server. Configuring a computer so that the computer restarts a protected and separate operating system stored on a portable boot media, the operating system, including system files and drivers, needs to be identified and managed. The computer is used to start the operating system in the portable medium, and run the browser in the portable medium. The computer is configured so that the browser in the secure and independent portable medium accesses the remote server. The portable medium stores system software, and the system software includes browser, communication and connection software.

现有技术中的访问远程终端的过程是将操作系统和浏览器都设置在计算机终端上,计算机终端和远程服务器进行连接,浏览器和操作系统提供通过互联网访问远程服务器的计算机环境和检索信息,然而,计算机终端容易受到攻击的入侵者,可以被操纵,因此,为了避免截取敏感数据的风险,在本发明中,浏览器和操作系统都安全的存储到便携式介质中,实现对远程服务器的访问。The process of accessing the remote terminal in the prior art is to set the operating system and the browser on the computer terminal, the computer terminal is connected to the remote server, and the browser and the operating system provide the computer environment and retrieve information for accessing the remote server through the Internet. However, computer terminals are vulnerable to intruders and can be manipulated. Therefore, in order to avoid the risk of intercepting sensitive data, in the present invention, both the browser and the operating system are safely stored in portable media to achieve access to remote servers .

具体的,远程访问服务器需要一个合法的存储在便携式媒介中的操作系统,操作系统可以存储到软盘这类便携式介质中。类似地,其它便携式和易于访问的媒体具有较大的存储容量,如内存闪存卡,是用来存储连接和通信软件,例如存储浏览器。Specifically, the remote access server needs a legitimate operating system stored in a portable medium, and the operating system can be stored in a portable medium such as a floppy disk. Similarly, other portable and easily accessible media with large storage capacities, such as memory flash cards, are used to store connectivity and communication software, such as storing browsers.

本发明所提供的一种便携式独立安全访问远程服务器的方法,利用计算机启动便携式介质中的操作系统,运行便携式介质中的浏览器;通过便携式介质中的浏览器对访问信息进行验证,验证成功之后利用便携式介质中的浏览器连接远程服务器,成功访问远程服务器。A portable, independent and secure method for accessing a remote server provided by the present invention uses a computer to start the operating system in the portable medium and run the browser in the portable medium; the access information is verified through the browser in the portable medium, and after successful verification Use the browser in the portable medium to connect to the remote server, and successfully access the remote server.

可见,操作系统和浏览器都是设置在便携式介质中,浏览器设置在便携式介质中,通过便携式介质里的浏览器来连接远程服务器,由于浏览器存储在便携式介质中,黑客无法攻击便携带介质,进而无法攻击位于便携带介质中的浏览器,无法修改浏览器中的默认设置来操作浏览器,也就无法获取用户访问远程客户端的通信信息,因此该方法将浏览器和操作系统设置在便携式介质中,利用便携式介质中的浏览器来连接远程服务器,避免了黑客的恶意攻击,提高访问远程服务器的安全性。It can be seen that both the operating system and the browser are set in the portable medium, and the browser is set in the portable medium, and the remote server is connected through the browser in the portable medium. Since the browser is stored in the portable medium, hackers cannot attack the portable medium , and then cannot attack the browser located in the portable medium, cannot modify the default settings in the browser to operate the browser, and cannot obtain the communication information of the user accessing the remote client, so this method sets the browser and operating system in a portable medium In the medium, the browser in the portable medium is used to connect to the remote server, which avoids malicious attacks of hackers and improves the security of accessing the remote server.

以上对本发明所提供的一种便携式独立安全访问远程服务器的方法进行了详细介绍。本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想。应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以对本发明进行若干改进和修饰,这些改进和修饰也落入本发明权利要求的保护范围内。A method for portable independent and secure access to a remote server provided by the present invention has been introduced in detail above. In this paper, specific examples are used to illustrate the principle and implementation of the present invention, and the descriptions of the above embodiments are only used to help understand the method and core idea of the present invention. It should be pointed out that for those skilled in the art, without departing from the principle of the present invention, some improvements and modifications can be made to the present invention, and these improvements and modifications also fall within the protection scope of the claims of the present invention.

Claims (7)

1. a method for portable individual secure access remote server, is characterized in that, comprising:
Utilize the operating system in computer starting portable medium, run the browser in portable medium;
By the browser in portable medium, visit information is verified, after being proved to be successful, utilize the browser in portable medium to connect remote server, successful access remote server.
2. the method for claim 1, is characterized in that, described visit information comprises username information and encrypted message.
3. the method for claim 1, is characterized in that, described portable medium comprises floppy disk or RAM (random access memory) card.
4. the method for claim 1, is characterized in that, described operating system and described browser are stored in described portable medium.
5. method as claimed in claim 4, is characterized in that, also store email client in described portable medium.
6. method as claimed in claim 5, is characterized in that, mail access information, for receiving the mail access information of user's input, is sent to remote server by described email client.
7. as the method in claim 1 to 6 as described in any one, it is characterized in that, after described successful access remote server, also comprise:
Set up communication link between described browser and remote server, the communication information of user's input in browser is transferred to remote server.
CN201510795847.8A 2015-11-18 2015-11-18 Method for portably, independently and securely accessing to remote server Pending CN105488378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510795847.8A CN105488378A (en) 2015-11-18 2015-11-18 Method for portably, independently and securely accessing to remote server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510795847.8A CN105488378A (en) 2015-11-18 2015-11-18 Method for portably, independently and securely accessing to remote server

Publications (1)

Publication Number Publication Date
CN105488378A true CN105488378A (en) 2016-04-13

Family

ID=55675351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510795847.8A Pending CN105488378A (en) 2015-11-18 2015-11-18 Method for portably, independently and securely accessing to remote server

Country Status (1)

Country Link
CN (1) CN105488378A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020147912A1 (en) * 2000-10-27 2002-10-10 Shimon Shmueli Preference portability for computing
CN101334824A (en) * 2007-04-11 2008-12-31 趋势科技公司 Portable secured computing environment for performing online confidential transactions in untrusted computers
CN101430649A (en) * 2008-11-19 2009-05-13 北京航空航天大学 Virtual computation environmental system based on virtual machine
CN101490648A (en) * 2006-07-25 2009-07-22 Nxp股份有限公司 Mobile device comprising an operating system emulator

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020147912A1 (en) * 2000-10-27 2002-10-10 Shimon Shmueli Preference portability for computing
CN101490648A (en) * 2006-07-25 2009-07-22 Nxp股份有限公司 Mobile device comprising an operating system emulator
CN101334824A (en) * 2007-04-11 2008-12-31 趋势科技公司 Portable secured computing environment for performing online confidential transactions in untrusted computers
CN101430649A (en) * 2008-11-19 2009-05-13 北京航空航天大学 Virtual computation environmental system based on virtual machine

Similar Documents

Publication Publication Date Title
KR102204705B1 (en) System for controlling network access and method thereof
US11140150B2 (en) System and method for secure online authentication
US10419425B2 (en) Method, device, and system for access control of a cloud hosting service
EP3345087B1 (en) Method, device, and system for access control of a cloud hosting service
KR102420969B1 (en) System and method for integrating an authentication service within a network architecture
US8370899B2 (en) Disposable browser for commercial banking
JP5928854B2 (en) Method, device and system for managing user authentication
KR102460694B1 (en) System for controlling network access based on controller and method of the same
US8266683B2 (en) Automated security privilege setting for remote system users
US20090006232A1 (en) Secure computer and internet transaction software and hardware and uses thereof
US20150067793A1 (en) Method for Secure, Entryless Login Using Internet Connected Device
US20100257359A1 (en) Method of and apparatus for protecting private data entry within secure web sessions
JP7489147B2 (en) System and method for authenticating and controlling network connections of terminals - Patents.com
US11868476B2 (en) Boot-specific key access in a virtual device platform
KR102439881B1 (en) System for controlling network access based on controller and method of the same
KR102460695B1 (en) System for controlling network access based on controller and method of the same
JP7401288B2 (en) System and method for changing account record passwords under threat of unauthorized access to user data
KR102415567B1 (en) System for controlling network access of virtualization terminal and method of the same
CN113678131A (en) Secure online applications and web pages with blockchain
CN105282166A (en) Identity authentication method and system for linux operating system
KR20170059359A (en) Verification mehod and appratus based on security tunnel
KR101619928B1 (en) Remote control system of mobile
US20080060060A1 (en) Automated Security privilege setting for remote system users
CN105488378A (en) Method for portably, independently and securely accessing to remote server
CN108886524A (en) secure remote authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160413

RJ01 Rejection of invention patent application after publication