CN102868533B - resource access authorization verification method and system - Google Patents

resource access authorization verification method and system Download PDF

Info

Publication number
CN102868533B
CN102868533B CN201210338534.6A CN201210338534A CN102868533B CN 102868533 B CN102868533 B CN 102868533B CN 201210338534 A CN201210338534 A CN 201210338534A CN 102868533 B CN102868533 B CN 102868533B
Authority
CN
China
Prior art keywords
resource
request
client
parameter information
supply system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210338534.6A
Other languages
Chinese (zh)
Other versions
CN102868533A (en
Inventor
肖翔
黄平显
胡劼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China General Nuclear Power Corp
China Nuclear Power Technology Research Institute Co Ltd
Original Assignee
China General Nuclear Power Corp
China Nuclear Power Technology Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China General Nuclear Power Corp, China Nuclear Power Technology Research Institute Co Ltd filed Critical China General Nuclear Power Corp
Priority to CN201210338534.6A priority Critical patent/CN102868533B/en
Publication of CN102868533A publication Critical patent/CN102868533A/en
Application granted granted Critical
Publication of CN102868533B publication Critical patent/CN102868533B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of resource access authorization verification method and system. The method, for the resource access between client-requested system and Resource Supply system, comprises the following steps: S1: client-requested system is sent resource request instruction, includes authentication secret and customer parameter information in described resource request instruction; S2: Resource Supply system receives described resource request instruction, and described authentication secret is verified, be verified and enter step S3; S3: Resource Supply system is carried out request permissions checking according to customer parameter information, after request permissions is verified, returns to the resource corresponding with described resource request instruction. By multiple-authentications such as authentication secret, request permissions checkings, guarantee the security of resource; And all checkings all complete in Resource Supply system, can effectively avoid illegally distorting of client-requested system, the security that has improved resource.

Description

Resource access authorization verification method and system
Technical field
The present invention relates to Internet resources security fields, more particularly, relate to a kind of can be used between at least two systemsResource access authorization verification method and system.
Background technology
Current network Development is more and more faster, and the spread speed of information increases day by day. Protect for the resource on network,Paid close attention to by vast IT enterprises. The resource here includes, but are not limited to: the electronics of invoice bill, pay sheet, reimbursement voucherScanned copy, encrypt file transmission, charge video, audio frequency, various documents etc. If resource is not protected, probably stealChain, the file event such as divulge a secret.
Generally browsing an important phenomenon and be exactly a complete page is not to be once all sent to client. If request is the page with many pictures and out of Memory, a Http request so is at first transmittedWhat return is the text of this page, then by the browser of client, the explanation of this section of text is carried out, and also finds whereinHave picture, the browser of client can send Http request more so, this picture so after this request is processedFile can be sent to client, and then browser can be placed to picture the tram of the page, like this one completePerhaps, the page will be asked through many Http of transmission can be by complete demonstration.
Based on such mechanism, will produce a problem, that steals chain problem exactly: do not have in a website if be exactlyPlay said information in the page, for example pictorial information, it completely can be by other website that is connected to of this picture so. Like thisWithout any the website use of resource the resource of other website show viewer, improved the visit capacity of oneself, and largePart viewer can not find again easily, and obvious like this, the website that has been utilized resource for that is inequitable. OneA little objectionable websites expand own site contents in order not increase cost, often usurp the link of other websites. Infringement on the one handThe legitimate interests of original web, increased the weight of again on the other hand the burden of server.
If steal the chain person image resource of browser server easily, the significant data comprising in image so is just depositedIn the possibility of divulging a secret, steal the URL link that chain person only need to know picture, can download picture, deposit this locality, be forwarded to itHis website.
Summary of the invention
The technical problem to be solved in the present invention is, provides a kind of and can effectively ensure that the resource access authorization of resource security testsCard method and system.
The technical solution adopted for the present invention to solve the technical problems is: a kind of resource access authorization verification method is provided,For the resource access between client-requested system and Resource Supply system, comprise the following steps:
S1: client-requested system is sent resource request instruction, in described resource request instruction, include authentication secret, withAnd customer parameter information;
S2: Resource Supply system receives described resource request instruction, and described authentication secret is verified, be verifiedEnter step S3;
S3: Resource Supply system is carried out request permissions checking according to customer parameter information, after request permissions is verified,Return to the resource corresponding with described resource request instruction.
In resource access authorization verification method of the present invention, described client-requested system and Resource Supply system areWeb application system.
In resource access authorization verification method of the present invention, described method also comprises step S4: described client-requestedThe privately owned shared key of the common negotiation of system and Resource Supply system, is provided with key authentication data in described Resource Supply systemStorehouse;
In described step S2, the authentication secret in described resource request instruction is entered in described key authentication databaseRow checking, is verified and enters step S3, haves no right visit information otherwise return.
In resource access authorization verification method of the present invention, described step S3 comprises:
S3-1: described Resource Supply system by the internal memory of described customer parameter information and described Resource Supply systemJoin data and carry out request permissions checking, after request permissions is verified, execution step S3-2, cannot lead in request permissions checkingOut-of-date, execution step S3-3;
S3-2: described Resource Supply system is exported the page according to described resource request instruction load resource, and loading moneyWhen resource corresponding to source output page face, again from send the client-requested system of described resource request instruction, obtain user's ginsengNumber information, and carry out request permissions checking with the matched data in the internal memory of described Resource Supply system, verify at request permissionsBy rear, return to corresponding resource;
S3-3: described Resource Supply system is by the user who stores in described customer parameter information and described Resource Supply systemMate in storehouse, after coupling is passed through, described customer parameter information is written in the internal memory of described Resource Supply systemJoin in data, then perform step S3-1 and S3-2; When coupling cannot by time, return and have no right visit information.
In the described step S3-1 of resource access authorization verification method of the present invention, described customer parameter information comprises useName in an account book and the user right corresponding with user name; Described matched data comprises authorized user name and right with authorized user nameThe authorized user authority of answering; Carrying out request permissions when checking, described user name and user right can with described authorized user nameDuring with authorized user permission match, verify by request permissions, otherwise cannot pass through.
In the described step S3-2 of resource access authorization verification method of the present invention, loading resource output page face correspondenceResource time, the OPADD of resolving resource corresponding label, is transmitted to Handle every address and processes; This Handle receivesTo after the request of address, get the parameter value in address, and again get and in client-requested system, obtain customer parameter information,After request permissions is verified, return to corresponding resource according to the parameter value in address.
In the described step S3-3 of resource access authorization verification method of the present invention, described client-requested system is passed throughWebService calls the mandate interface module of described Resource Supply system, by authorizing interface module to receive described user's ginsengNumber information, and mate with the user library of storing in described Resource Supply system, after coupling is passed through, by described customer parameterInformation is written in the matched data in the internal memory of described Resource Supply system.
The present invention also provides a kind of resource access authorization verification system, comprises client-requested system and the money of connecting communicationSource provides system, and described client-requested system comprises request module, and for sending resource request instruction, described resource request refers toIn order, include authentication secret and customer parameter information;
Described Resource Supply system comprises:
Access authentication module, for verifying the authentication secret from described client-requested system;
Authority Verification module, carries out request permissions for the customer parameter information to from described client-requested system and testsCard;
Processing module, for according to the result of described access authentication module and Authority Verification module, to from describedThe resource request instruction of client-requested system is processed; And
Memory module, stores key authentication database and user library.
In resource access authorization verification system of the present invention, described Resource Supply system also comprises:
Internal memory, for storing matched data; And
Authorize interface module, with described Memory linkage, for the customer parameter from described client-requested system is believedBreath mates with described user library, and is described matched data by the described customer parameter information processing of coupling, and is stored inIn described internal memory.
In resource access authorization verification system of the present invention, described Authority Verification module and described Memory linkage, in the futureMatched data in customer parameter information and the described internal memory of described client-requested system is carried out request permissions checking.
Implement the present invention and there is following beneficial effect: by multiple-authentications such as authentication secret, request permissions checkings, guaranteedThe security of resource; And all checkings all complete in Resource Supply system, can effectively avoid the illegal of client-requested systemDistort, improved the security of resource.
In addition, due to request permissions checking only need with internal memory in matching list carry out, matching list is as the relation of light weightData, have avoided taking too much Resource Supply system resource, and without frequently with database, the client of memory moduleRequest System is carried out mutual frequently, has effectively improved runnability.
In addition, even leak at resource link, also can ensure the safety of this resource, because when there being disabled user to askWhen resource, all can arrive all the time the Resource Supply system resource that conducts interviews, and when access resources, must verify mandate, non-like thisMethod user cannot read resource all the time, thereby has guaranteed the security of resource.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the schematic block diagram of an embodiment of resource access authorization verification system of the present invention;
Fig. 2 is the schematic flow diagram of the authorisation step of an embodiment of resource access authorization verification method of the present invention;
Fig. 3 is the schematic flow diagram of the resource request of an embodiment of resource access authorization verification method of the present invention.
Detailed description of the invention
As shown in Figure 1, be an embodiment of resource access authorization verification system of the present invention, comprise can communication connectingClient-requested system 10 and Resource Supply system 20. In the present embodiment, this client-requested system 10 and Resource Supply systemSystem 20 is Web application system. Wherein, Web application system is applied to WebService technology, and WebService is one and answersWith assembly, its logicality is to provide geodata and services for other application programs. Each application program is by procotol and regulationSome standard data formats (Http, XML, Soap) visit WebService, obtain by inner execution of WebServiceResults needed. WebService can carry out any function from simple request to complicated business processing. Once dispose withAfter, the service that it is disposed can be found and call to other WebService application programs.
Wherein, client-requested system 10, for to Resource Supply system 20 request resource, comprises request module 11, forSend resource request instruction. In this resource request instruction, include authentication secret and customer parameter information etc., certainly, also bagDraw together the specifying information of request resource etc.
This Resource Supply system 20, as server, for client-requested system 10 provides resource, comprises access checking mouldPiece 21, Authority Verification module 22, processing module 22, memory module 24, internal memory 25 etc.
This access authentication module 21 is for to verifying from the authentication secret of client-requested system 10, by testingCard key and key authentication database carry out contrast verification, to determine that whether client-requested system 10 is as validated user.
This Authority Verification module 22 is carried out request permissions for the customer parameter information to from client-requested system 10Checking, by the matched data in customer parameter information and internal memory 25 is contrasted, to determine this client-requested system 10Whether there is the authority of corresponding resource.
This processing module 22 is for according to the result of access authentication module 21 and Authority Verification module 22, to from visitorThe resource request instruction of family end Request System 10 is processed, to return to the money of request by the request of verifying and have an authoritySource.
This memory module 24 is for storage key validation database and user library etc., and confession is verified, licensed.
Further, this Resource Supply system 20 is also provided with authorizes interface module 26, is connected, for will be from internal memory 25The customer parameter information of client-requested system 10 is mated with the user library of memory module 24, and by the customer parameter of couplingInformation processing is matched data, and is stored in internal memory 25, uses for Authority Verification module 22, is about to from client-requestedMatched data in customer parameter information and the internal memory 25 of system 10 is carried out request permissions checking.
As shown in Figure 2,3, be an embodiment of resource access authorization verification method of the present invention. In the present embodiment,The method comprises checking configuration step, authorisation step and checking authorisation step etc.
(not shown) in configuration step, client-requested system 10 and privately owned the sharing of the common negotiation of Resource Supply system 20Key (as Passport key), in Resource Supply system 20, be provided with key authentication database, identify thus clientWhether Internet access Resource Supply system 20 of Request System 10.
Before providing system 20, access resources can read key authentication database one time, checking client Request System 10The key of holding. Permit if meet Resource Supply system 20 key calling, just accessible resource provides system 20. If closeKey does not meet, and will be judged to be malice and authorize or authorize and illegally distorted, and returns and haves no right to access.
This key can adopt Passport key, specifies a private cipher key to deposit key in test by Resource Supply system 20In the allocation list field of card database. Client-requested system 10 can be carried key to Resource Supply system 20, carries out key and testsCard. If key conforms to allocation list field, think these client-requested system 10 Internet access; Otherwise output haves no right to accessInformation, for example, return have no right access notifications, make mistakes notice etc.
As shown in Figure 2, send resource request instruction request resource in client-requested system 10 to Resource Supply system 20Time (S201), must carry out request permissions checking (S202), Resource Supply system 20 by customer parameter information and internal memory 25Join data and carry out request permissions checking, after request permissions is verified, return to the resource corresponding with resource request instruction(S203); In the time that request permissions checking cannot be passed through, need authorize client-requested system 10.
Client-requested system 10 is called the mandate interface module 26 of Resource Supply system 20 by WebService, logicalCross mandate interface module 26 and receive customer parameter information (S204), and with the memory module 24 of Resource Supply system 20 in storageUser library mates (S205), after coupling is passed through, customer parameter information is written to the internal memory 25 of Resource Supply system 20Matched data in (S206); When coupling cannot by time, return and have no right visit information (S207).
Understandable, in this internal memory 25, can preserve overall matched data, in this table, preserve all authorized usersName and the authorized user authority corresponding with this authorized user name. And Resource Supply system 20 can record this authorized user nameAuthority record, generate daily record, deposit database in.
Exactly because in internal memory 25, preserve the relation data of light weight, thus reach can be not too much the Resource Supply that takiesThe resource of system 20, can be not frequently not mutual with database, client-requested system 10 yet, effectively improve runnability.
As shown in Figure 3, be the flow chart that client-requested system 10 is sent a resource request, first, user is to clientEnd Request System 10 request resource. These users of client-requested system 10 checking request of sending of whether having the right, if had the right, visitorFamily end Request System 10 is sent resource request instruction, includes authentication secret and customer parameter information in resource request instruction;If had no right, output haves no right to check prompting.
Client-requested system 10 loads user's resource request instruction, and resource request instruction is issued to Resource Supply systemSystem 20, for example, export Resource Supply system 20 to by WebServer.
Resource Supply system 20 receives resource request instruction, and the authentication secret of resource request instruction is verified,When checking cannot be passed through, output haves no right to check prompting; While being verified, also do not write Resource Supply in this customer parameter informationWhen the internal memory 25 of system 20, carry out the foregoing step that client-requested system 10 is authorized.
In the time that customer parameter information has deposited internal memory 25 in, client-requested system 10 is quoted the money of Resource Supply system 20The source output page; And, these users of Resource Supply system 20 checking requests for page of whether having the right.
The matched data in customer parameter information and internal memory 25 is carried out request permissions checking by Resource Supply system 20. UserParameter information comprises user name and the user right corresponding with user name; Matched data comprise authorized user name and with awardAuthorized user authority corresponding to power user name. In the time carrying out request permissions checking, user name and user right energy and authorized userWhen name and authorized user permission match, verify by request permissions, otherwise cannot pass through.
In the time that checking client Request System 10 is had no right the access resources output page, output haves no right to check instruction.
In the time of the checking client Request System 10 Internet access resource output page, continue checking and whether have the right to ask this pageThe corresponding resource of face, after being verified, normally output. Otherwise output haves no right to check instruction.
In the time loading resource corresponding to resource output page face, the OPADD of resolving resource corresponding label, turns every addressIssuing a Handle processes; This Handle receives after the request of address, gets the parameter value in address, and again gets visitorIn family end Request System 10, obtain customer parameter information, after request permissions is verified, return according to the parameter value in addressCorresponding resource; Thereby, even if the link of resource page leak or circulate away, visitor carry out page resource access time,Also need authentication of users parameter information again, disabled user cannot, by checking, just have no right to browse the resource of actual request, also withoutMethod is carried out subscriber authorisation, has further improved the security of system.
In addition, even if the resource of the client-requested system 10 output page is revealed or circulates away, illegal user alsoBe to pass through above-mentioned mandate, checking, can play equally the risk that prevents resource stealing, further improved the peace of systemQuan Xing.
Between above-mentioned each technical characterictic, can be combined into as required various embodiment, again not repeat. CanUnderstand, above embodiment has only expressed the preferred embodiment of the present invention, and it describes comparatively concrete and in detail, but can not be because ofThis and be interpreted as the restriction to the scope of the claims of the present invention; It should be pointed out that for the person of ordinary skill of the art,Do not depart under the prerequisite of the present invention design, can carry out independent assortment to above-mentioned technical characterstic, can also make some distortion andImprove, these all belong to protection scope of the present invention; Therefore, all equivalents of doing with the claims in the present invention scope with repairAdorn, all should belong to the covering scope of the claims in the present invention.

Claims (10)

1. the resource access authorization verification method between Web application system, for client-requested system and Resource Supply systemResource access between system, is characterized in that, comprises the following steps:
S1: client-requested system is sent resource request instruction, includes authentication secret in described resource request instruction correspondingThe specifying information of customer parameter information and request resource;
S2: Resource Supply system receives described resource request instruction, and described authentication secret is verified, be verifiedEnter step S3;
S3: Resource Supply system is carried out request permissions checking according to customer parameter information, after request permissions is verified, returnsThe resource corresponding with the specifying information of the described request resource of described resource request instruction.
2. the resource access authorization verification method between Web application system according to claim 1, is characterized in that, described inClient-requested system and Resource Supply system are Web application system.
3. the resource access authorization verification method between Web application system according to claim 1, is characterized in that, described inMethod also comprises step S4: the privately owned shared key of the common negotiation of described client-requested system and Resource Supply system, described inIn Resource Supply system, be provided with key authentication database;
In described step S2, the authentication secret in described resource request instruction is tested in described key authentication databaseCard, is verified and enters step S3, haves no right visit information otherwise return.
4. the resource access authorization verification method between Web application system according to claim 3, is characterized in that, described inStep S3 comprises:
S3-1: described Resource Supply system is by the number that mates in the internal memory of described customer parameter information and described Resource Supply systemAccording to carrying out request permissions checking, after request permissions is verified, execution step S3-2, cannot pass through in request permissions checkingTime, execution step S3-3;
S3-2: described Resource Supply system is exported the page according to described resource request instruction load resource, and defeated in loading resourceWhen resource corresponding to page-out, again from send the client-requested system of described resource request instruction, obtain customer parameter letterBreath, and carry out request permissions checking with the matched data in the internal memory of described Resource Supply system, be verified at request permissionsAfter, return to corresponding resource;
S3-3: described Resource Supply system is entered the user library of storing in described customer parameter information and described Resource Supply systemRow coupling, after coupling is passed through, is written to described customer parameter information the coupling number in the internal memory of described Resource Supply systemAccording in, then perform step S3-1 and S3-2; When coupling cannot by time, return and have no right visit information.
5. the resource access authorization verification method between Web application system according to claim 4, is characterized in that, in instituteState in step S3-1, described customer parameter information comprises user name and the user right corresponding with user name; Described coupling numberAccording to comprising authorized user name and the authorized user authority corresponding with authorized user name; In the time carrying out request permissions checking, described inWhen user name and user right can be with described authorized user name and authorized user permission matchs, verify by request permissions, otherwiseCannot pass through.
6. the resource access authorization verification method between Web application system according to claim 4, is characterized in that, in instituteState in step S3-2, in the time loading resource corresponding to resource output page face, the OPADD of resolving resource corresponding label, eachAddress is transmitted to a Handle and processes; This Handle receives after the request of address, gets the parameter value in address, and againInferior going obtains customer parameter information in client-requested system, after request permissions is verified, according to the parameter value in addressReturn to corresponding resource.
7. the resource access authorization verification method between Web application system according to claim 4, is characterized in that, in instituteState in step S3-3, described client-requested system is called the mandate interface of described Resource Supply system by WebServiceModule, by authorizing interface module to receive described customer parameter information, and with described Resource Supply system in the user library storedMate, after coupling is passed through, described customer parameter information is written to the coupling in the internal memory of described Resource Supply systemIn data.
8. the resource access authorization verification system between Web application system, comprise connecting communication client-requested system andResource Supply system, is characterized in that, described client-requested system comprises request module, for sending resource request instruction,In described resource request instruction, include customer parameter information corresponding to authentication secret and the specifying information of request resource;
Described Resource Supply system comprises:
Access authentication module, for verifying the authentication secret from described client-requested system;
Authority Verification module, carries out request permissions checking for the customer parameter information to from described client-requested system;
Processing module, for according to the result of described access authentication module and Authority Verification module, to from described clientThe resource request instruction of end Request System is processed; And
Memory module, stores key authentication database and user library.
9. the resource access authorization verification system between Web application system according to claim 8, is characterized in that, described inResource Supply system also comprises:
Internal memory, for storing matched data; And
Authorize interface module, with described Memory linkage, for by the customer parameter information from described client-requested system withDescribed user library mates, and is described matched data by the described customer parameter information processing of coupling, and described in being stored inIn internal memory.
10. the resource access authorization verification system between Web application system according to claim 9, is characterized in that, described inAuthority Verification module and described Memory linkage, by the customer parameter information from described client-requested system and described internal memoryMatched data carry out request permissions checking.
CN201210338534.6A 2012-09-13 2012-09-13 resource access authorization verification method and system Active CN102868533B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210338534.6A CN102868533B (en) 2012-09-13 2012-09-13 resource access authorization verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210338534.6A CN102868533B (en) 2012-09-13 2012-09-13 resource access authorization verification method and system

Publications (2)

Publication Number Publication Date
CN102868533A CN102868533A (en) 2013-01-09
CN102868533B true CN102868533B (en) 2016-05-25

Family

ID=47447139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210338534.6A Active CN102868533B (en) 2012-09-13 2012-09-13 resource access authorization verification method and system

Country Status (1)

Country Link
CN (1) CN102868533B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220289A (en) * 2013-04-15 2013-07-24 北京京东尚科信息技术有限公司 Resource verification system and resource verification method based on web application
CN105100032B (en) * 2014-05-23 2019-07-05 腾讯科技(北京)有限公司 A kind of method and device for preventing resource from stealing
CN104021351B (en) * 2014-05-28 2017-11-17 宇龙计算机通信科技(深圳)有限公司 The access method and device of a kind of data resource
CN104767766B (en) * 2015-05-08 2018-03-27 广州视源电子科技股份有限公司 A kind of Web Service interfaces verification method, Web Service servers, client
CN105187449B (en) * 2015-09-30 2018-10-02 北京恒华伟业科技股份有限公司 A kind of interface call method and device
CN105871801A (en) * 2015-12-07 2016-08-17 乐视云计算有限公司 Stolen chain detection method and device
CN106959982A (en) * 2016-01-08 2017-07-18 深圳市星电商科技有限公司 Obtain methods, devices and systems, monitoring method and the device of resource
CN107015996A (en) * 2016-01-28 2017-08-04 阿里巴巴集团控股有限公司 A kind of resource access method, apparatus and system
CN106528640B (en) * 2016-10-13 2019-10-18 厦门中控生物识别信息技术有限公司 A kind of finger-mark check method and system based on browser
CN108243172B (en) * 2016-12-27 2020-08-04 武汉斗鱼网络科技有限公司 Method and system for sending verification information
CN107196943B (en) * 2017-05-26 2019-09-20 浙江大学 A kind of security display implementation method of private data in third-party platform
CN110995526A (en) * 2019-11-04 2020-04-10 苏州浪潮智能科技有限公司 Database resource isolation test method, system, terminal and storage medium
CN114157503A (en) * 2021-12-08 2022-03-08 北京天融信网络安全技术有限公司 Access request authentication method and device, API gateway equipment and storage medium
CN114363373B (en) * 2021-12-31 2024-03-15 中国第一汽车股份有限公司 Application communication management system, method, device, electronic equipment and storage medium
CN115065530B (en) * 2022-06-13 2024-01-23 北京华信傲天网络技术有限公司 Trusted data interaction method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083556B (en) * 2007-07-02 2010-04-14 蔡水平 Region based layered wireless information publishing, searching and communicating application system
CN101350710B (en) * 2007-07-16 2011-11-16 华为技术有限公司 Network system, authority issuing server, authority issuing and executing method
US20090271847A1 (en) * 2008-04-25 2009-10-29 Nokia Corporation Methods, Apparatuses, and Computer Program Products for Providing a Single Service Sign-On
CN101951603B (en) * 2010-10-14 2013-05-22 中国电子科技集团公司第三十研究所 Access control method and system for wireless local area network
CN102685086A (en) * 2011-04-14 2012-09-19 天脉聚源(北京)传媒科技有限公司 File access method and system

Also Published As

Publication number Publication date
CN102868533A (en) 2013-01-09

Similar Documents

Publication Publication Date Title
CN102868533B (en) resource access authorization verification method and system
US10146948B2 (en) Secure network access
Pretschner et al. Distributed usage control
CN101310286B (en) Improved single sign on
US11290446B2 (en) Access to data stored in a cloud
CN102724204B (en) Secure and trusted capability opening platform
CN102077208A (en) Licensing protected content to application sets
CN104718526A (en) Secure mobile framework
WO2023030450A1 (en) Data sharing method and electronic device
EP3920056B1 (en) Digital artwork display device, management method, and electronic device
CN101989988A (en) Copyright protection system and method of ebook online reading
US20210042748A1 (en) Blockchain-based secure resource management
KR100621318B1 (en) Method for managing access and use of resources by verifying conditions and conditions for use therewith
JP2002041347A (en) Information presentation system and device
US11861037B2 (en) Unified data fabric for managing data lifecycles and data flows
CN110532792B (en) Method and system for checking privacy information
Simske et al. APEX: Automated policy enforcement eXchange
Gunjan et al. Towards securing APIs in cloud computing
CN106534047A (en) Information transmitting method and apparatus based on Trust application
JP2007249690A (en) Member management system, service providing terminal and its method
JP2023093237A (en) Information processing device, information processing method, program, condominium management association terminal, and program
CN115130067A (en) Copyright stream transfer method and device based on block chain
CN109800596A (en) A kind of personal data safety management system
CN103999401B (en) For promoting the mthods, systems and devices of client-based certification
Fragopoulos et al. Adaptive DRM framework in user-converged multimedia ecosystems, utilizing MPEG-21 semantics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 518031 Guangdong province Futian District Shangbu Road West of the city of Shenzhen Shenzhen science and technology building 15 layer (1502-1504, 1506)

Patentee after: CHINA NUCLEAR POWER TECHNOLOGY RESEARCH INSTITUTE

Patentee after: China General Nuclear Power Corporation

Address before: 518000 Guangdong, Futian District, Yitian Road, building A, block, building on the whole floor of A1301-1320 13

Patentee before: Zhongkehua Nuclear Power Technology Institute Co., Ltd.

Patentee before: China Guangdong Nuclear Power Group Co., Ltd.