CN103020499A - Method for carrying out permission validation on write operation request of system - Google Patents
Method for carrying out permission validation on write operation request of system Download PDFInfo
- Publication number
- CN103020499A CN103020499A CN2012104843888A CN201210484388A CN103020499A CN 103020499 A CN103020499 A CN 103020499A CN 2012104843888 A CN2012104843888 A CN 2012104843888A CN 201210484388 A CN201210484388 A CN 201210484388A CN 103020499 A CN103020499 A CN 103020499A
- Authority
- CN
- China
- Prior art keywords
- write operation
- checking
- operation requests
- check information
- requests
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method for carrying out permission validation on a write operation request of a system. Permission validation of the write operation request which needs to be validated is divided into two steps of operation information extraction and operation information validation by arranging an operation information extraction module; and simultaneously, the write operation request which needs to be validated is released, so that the write operation request which needs to be validated can be executed when being validated, and thus, response time of the operation is reduced. Moreover, in the method, when the execution of the write operation request which needs to be validated is to be completed, permission validation is carried out, so that legality and safety of the write operation are ensured to the greatest degree and reliability of a validation result is improved.
Description
Technical field
The present invention relates to a kind of system's write operation requests be carried out the method for Authority Verification, belong to computer realm.
Background technology
There is the authority management function in most systems, with the operable envelop of function of personnel's account number of control different role.Existing main flow Authority Verification is verified before being operation, is specially, and operation and data that the rights of using authentication module will carry out request check, judge whether to meet the working rule license.Checking is passed through, and fair line operate is carried out the feature operation module.Checking is not passed through, and rejects operation requests.
This verification method is because the execution of Authority Verification occurs in before the execution of feature operation, and operation requests all will be in blocked state before by License Authentication can not be done whatever, until by checking; So just increased the response time of operation.After checking was passed through, system just thought that request is no problem, no longer pays close attention to the safety problem of this request; Often because the change of program, the variation of function, the variation of data causes the result of an Authority Verification no longer to be fit to some feature operations, even by checking, the operation that the request that also do not represent will be carried out subsequently is exactly legal safe; Reduced like this reliability of the result.
Summary of the invention
The object of the invention is to, a kind of method of system's write operation requests being carried out Authority Verification is provided.The method can reduce the response time of operation, and increases the reliability of the result.
For solving the problems of the technologies described above, technical scheme provided by the invention is as follows: a kind of method of system's write operation requests being carried out Authority Verification: will verify that by the setting operation information extraction modules Authority Verification of write operation requests is divided into operation information extraction and two steps of operation information checking, letting pass simultaneously needs the checking write operation requests, so that need the checking write operation requests can be performed when being verified.
Aforesaid system write operation requests is carried out in the method for Authority Verification, and the Authority Verification of described need checking write operation requests is divided into the operation information extraction and two steps of operation information checking are specially,
A. the operation information extraction module extracts the request check information a1 that needs checking write operation requests a, and will ask check information a1 to deposit pending district in; Simultaneously, need checking write operation requests a to be let pass, obtain as a result b1 of pre-operation;
B. when needing checking write operation requests a to be about to when complete, the feature operation module is taken out the request check information a1 in pending district, then according to request check information a1 and pre-operation as a result b1 need checking write operation requests a is verified.
Aforesaid system write operation requests is carried out in the method for Authority Verification, and described request check information a1 comprises the source of request, requestor's identity, the tolerance band of operation and the requirement of checking.
Aforesaid system write operation requests is carried out in the method for Authority Verification, described feature operation module is taken out the request check information a1 in pending district, then be specially according to asking check information a1 and operating result b1 that need checking write operation requests a is verified, the feature operation module is verified need checking write operation requests a according to requirement and the operating result b1 of the checking among the request check information a1.
Aforesaid system write operation requests is carried out in the method for Authority Verification, describedly prepare and the correlation computations step when needing checking write operation requests a to be about to refer to when the write operation requests a that needs checking executes data when complete, when being about to carry out the operation acknowledgement step of saving result.
Compared with prior art, the present invention will verify that by the setting operation information extraction modules Authority Verification of write operation requests is divided into operation information extraction and two steps of operation information checking, letting pass simultaneously needs the checking write operation requests, so that need the checking write operation requests when being verified, can be performed, reduced the response time of operation.And the present invention is in that requirement and the pre-operation result according to the checking in the request check information carries out the checking of authority when needing the checking write operation requests to be about to when complete, the data of using during checking are exactly to calculate complete data to be written, guarantee checking and what write must be legitimacy and the security that same piece of data has guaranteed write operation to the full extent, increased the reliability of the result.
Description of drawings
Fig. 1 is process flow diagram of the present invention.
The present invention is further illustrated below in conjunction with drawings and Examples, but not as the foundation to the present invention's restriction.
Embodiment.
A kind of method of system's write operation requests being carried out Authority Verification, to verify that by the setting operation information extraction modules Authority Verification of write operation requests is divided into operation information extraction and two steps of operation information checking, letting pass simultaneously needs the checking write operation requests, so that need the checking write operation requests can be performed when being verified.
The Authority Verification of need checking write operation requests is divided into the operation information extraction and two steps of operation information checking are specially,
A. the operation information extraction module extracts the request check information a1 that needs checking write operation requests a, and will ask check information a1 to deposit pending district in; Simultaneously, need checking write operation requests a to be let pass, obtain as a result b1 of pre-operation;
B. when needing checking write operation requests a to be about to when complete, the feature operation module is taken out the request check information a1 in pending district, then according to request check information a1 and pre-operation as a result b1 need checking write operation requests a is verified.
Request check information a1 comprises the source of request, requestor's identity, the tolerance band of operation and the requirement of checking.The feature operation module is taken out the request check information a1 in pending district, then be specially according to asking check information a1 and operating result b1 that need checking write operation requests a is verified, the feature operation module is verified need checking write operation requests a according to requirement and the operating result b1 of the checking among the request check information a1.
Do specific description below in conjunction with concrete example.
The commodity purchasing function of 1: one shopping center of embodiment, businessman also has 1000 stocks; Registered user A need buy 900 goods, and the goods of businessman is sold 200 in purchasing process, also surplus 800.Restriction only has the registered user to buy, and businessman must in stockit is available user could buy, flow process as shown in Figure 1:
1, user A sends the request a that places an order
2, the operation information extraction module begins to extract relevant request check information a1, the source (being the people) that comprises request, requestor's identity (whether user), the requirement of the tolerance band of operation (whether registered user) and checking (businessman must in stockit is available user could buy) deposits pending district in;
3, feature operation module and the 2nd step carry out simultaneously, the inquiry Business Information, and merchandise news, inventory information generates interim order.
4, before interim acknowledgement of orders saves as order, the feature operation module extracts request check information a1 and interim order is verified, finds that businessman's goods is not enough, and this user A of the result can not buy 900 these article, order is abandoned, and returns prompting user and can only buy 800 goods.
And when using the conventional method that system's write operation requests is carried out Authority Verification to verify, owing to before buying, just authority is verified, so when interim acknowledgement of orders saves as order, system thinks that the enough users of the goods of businessman buy, this user A can buy these article as a result, do not square with the fact, checking was lost efficacy.
Embodiment 2.
The photo upload feature capability of a social network sites, system constraint must the registered user just can be uploaded the photo that is not more than the photograph album capacity, and the photograph album capacity of user A is surplus 500MB also, and the photograph album capacity of user A is contracted to 300MB in upload procedure.The user uploads the photo of 400MB, flow process as shown in Figure 1:
1, user A sends upload request a
2, the operation information extraction module begins to extract relevant request check information a1, the source (being the people) that comprises request, requestor's identity (whether registered user), the tolerance band of operation (user's star) and the requirement verified (must registered user just can upload the photo that is not more than the photograph album capacity) deposit pending district in;
3, feature operation module and the 2nd step carry out simultaneously, and photo upload to server, is preserved temporarily;
4, before photo was preserved, the feature operation module extracts request check information a1 and the interim photo of preserving verifies that the photograph album capacity of this user A of the result is merely able to upload the photo of 300MB, returned prompting user and uploaded unsuccessfully, asked the user to screen photo.
And when using the conventional method that system's write operation requests is carried out Authority Verification to verify, owing to before carrying out upload operation, just authority is verified, so the result user can upload the photo of 400MB, this user A uploads the photo of 400MB but only preserves the photo of 300MB as a result, all the other photos are lost, affect user's use, checking was lost efficacy.
Claims (4)
1. method of system's write operation requests being carried out Authority Verification, it is characterized in that: will verify that by the setting operation information extraction modules Authority Verification of write operation requests is divided into operation information extraction and two steps of operation information checking, letting pass simultaneously needs the checking write operation requests, so that need the checking write operation requests can be performed when being verified.
2. system according to claim 1 write operation requests is carried out the method for Authority Verification, it is characterized in that: the described Authority Verification that needs the checking write operation requests is divided into that operation information extracts and operation information verifies that two steps are specially,
A. the operation information extraction module extracts the request check information a1 that needs checking write operation requests a, and will ask check information a1 to deposit pending district in; Simultaneously, need checking write operation requests a to be let pass, obtain as a result b1 of pre-operation;
B. when needing checking write operation requests a to be about to when complete, the feature operation module is taken out the request check information a1 in pending district, then according to request check information a1 and pre-operation as a result b1 need checking write operation requests a is verified.
3. system according to claim 2 write operation requests is carried out the method for Authority Verification, and it is characterized in that: described request check information a1 comprises the source of request, requestor's identity, the tolerance band of operation and the requirement of checking.
4. system according to claim 3 write operation requests is carried out the method for Authority Verification, it is characterized in that: described feature operation module is taken out the request check information a1 in pending district, then be specially according to asking check information a1 and operating result b1 that need checking write operation requests a is verified, the feature operation module is verified need checking write operation requests a according to requirement and the operating result b1 of the checking among the request check information a1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012104843888A CN103020499A (en) | 2012-11-23 | 2012-11-23 | Method for carrying out permission validation on write operation request of system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012104843888A CN103020499A (en) | 2012-11-23 | 2012-11-23 | Method for carrying out permission validation on write operation request of system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103020499A true CN103020499A (en) | 2013-04-03 |
Family
ID=47969096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012104843888A Pending CN103020499A (en) | 2012-11-23 | 2012-11-23 | Method for carrying out permission validation on write operation request of system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103020499A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110261616A1 (en) * | 2010-04-26 | 2011-10-27 | Mosaid Technologies Incorporated | Write scheme in phase change memory |
CN102546664A (en) * | 2012-02-27 | 2012-07-04 | 中国科学院计算技术研究所 | User and authority management method and system for distributed file system |
CN202524458U (en) * | 2012-04-13 | 2012-11-07 | 深圳市金立通信设备有限公司 | Mobile phone information safety protection system based on fingerprint and navigation key superposition |
-
2012
- 2012-11-23 CN CN2012104843888A patent/CN103020499A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110261616A1 (en) * | 2010-04-26 | 2011-10-27 | Mosaid Technologies Incorporated | Write scheme in phase change memory |
CN102546664A (en) * | 2012-02-27 | 2012-07-04 | 中国科学院计算技术研究所 | User and authority management method and system for distributed file system |
CN202524458U (en) * | 2012-04-13 | 2012-11-07 | 深圳市金立通信设备有限公司 | Mobile phone information safety protection system based on fingerprint and navigation key superposition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2020200682B2 (en) | Systems and methods of secure provenance for distributed transaction databases | |
CN109889503B (en) | Identity management method based on block chain, electronic device and storage medium | |
US9027094B1 (en) | Associating data initially with devices and subsequently with accounts | |
CN105144217A (en) | System and method for using multiple payment accounts using a single payment device | |
US10956972B2 (en) | Account access system | |
CN105262780B (en) | A kind of authority control method and system | |
CN102542695B (en) | A kind of tax control liquid crystal USB flash disk with authentication and fingerprint recognition | |
WO2017157185A1 (en) | Method and device for linking to account and providing service process | |
US11720866B1 (en) | Transferring funds between two parties | |
PH12018500921A1 (en) | System and method for facilitating electronic transactions | |
CN101799901B (en) | Method for rapidly registering account, recharging and landing | |
WO2016107467A1 (en) | Request sending method and device thereof | |
CN102685122B (en) | The method of the software protection based on cloud server | |
CN106921708B (en) | Group management method and device | |
CN105404799A (en) | Authority management apparatus in information system | |
US20160224956A1 (en) | Distributed digital rights-managed file transfer and access control | |
CN104537537A (en) | Safety payment method based on Android system | |
CN107230080B (en) | Service processing method and device and intelligent terminal | |
WO2019062220A1 (en) | Fingerprint payment method and apparatus therefor, and user terminal | |
JP2017530492A (en) | Authentication system and method | |
CN113269624A (en) | Authentication and authorization method and device | |
CN104301284A (en) | Multi-application smart card and multi-application management method for smart card | |
CN103020499A (en) | Method for carrying out permission validation on write operation request of system | |
CN105741111A (en) | Mobile payment method, system and device | |
CN102880819B (en) | The cipher set-up method of the outer user of system, system and password arrange center |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130403 |