CN103020499A - Method for carrying out permission validation on write operation request of system - Google Patents

Method for carrying out permission validation on write operation request of system Download PDF

Info

Publication number
CN103020499A
CN103020499A CN2012104843888A CN201210484388A CN103020499A CN 103020499 A CN103020499 A CN 103020499A CN 2012104843888 A CN2012104843888 A CN 2012104843888A CN 201210484388 A CN201210484388 A CN 201210484388A CN 103020499 A CN103020499 A CN 103020499A
Authority
CN
China
Prior art keywords
write operation
checking
operation requests
check information
requests
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012104843888A
Other languages
Chinese (zh)
Inventor
余晓翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU YEYAOMAI ELECTRONIC BUSINESS CO Ltd
Original Assignee
HANGZHOU YEYAOMAI ELECTRONIC BUSINESS CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU YEYAOMAI ELECTRONIC BUSINESS CO Ltd filed Critical HANGZHOU YEYAOMAI ELECTRONIC BUSINESS CO Ltd
Priority to CN2012104843888A priority Critical patent/CN103020499A/en
Publication of CN103020499A publication Critical patent/CN103020499A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method for carrying out permission validation on a write operation request of a system. Permission validation of the write operation request which needs to be validated is divided into two steps of operation information extraction and operation information validation by arranging an operation information extraction module; and simultaneously, the write operation request which needs to be validated is released, so that the write operation request which needs to be validated can be executed when being validated, and thus, response time of the operation is reduced. Moreover, in the method, when the execution of the write operation request which needs to be validated is to be completed, permission validation is carried out, so that legality and safety of the write operation are ensured to the greatest degree and reliability of a validation result is improved.

Description

A kind of method of system's write operation requests being carried out Authority Verification
Technical field
The present invention relates to a kind of system's write operation requests be carried out the method for Authority Verification, belong to computer realm.
Background technology
There is the authority management function in most systems, with the operable envelop of function of personnel's account number of control different role.Existing main flow Authority Verification is verified before being operation, is specially, and operation and data that the rights of using authentication module will carry out request check, judge whether to meet the working rule license.Checking is passed through, and fair line operate is carried out the feature operation module.Checking is not passed through, and rejects operation requests.
This verification method is because the execution of Authority Verification occurs in before the execution of feature operation, and operation requests all will be in blocked state before by License Authentication can not be done whatever, until by checking; So just increased the response time of operation.After checking was passed through, system just thought that request is no problem, no longer pays close attention to the safety problem of this request; Often because the change of program, the variation of function, the variation of data causes the result of an Authority Verification no longer to be fit to some feature operations, even by checking, the operation that the request that also do not represent will be carried out subsequently is exactly legal safe; Reduced like this reliability of the result.
Summary of the invention
The object of the invention is to, a kind of method of system's write operation requests being carried out Authority Verification is provided.The method can reduce the response time of operation, and increases the reliability of the result.
For solving the problems of the technologies described above, technical scheme provided by the invention is as follows: a kind of method of system's write operation requests being carried out Authority Verification: will verify that by the setting operation information extraction modules Authority Verification of write operation requests is divided into operation information extraction and two steps of operation information checking, letting pass simultaneously needs the checking write operation requests, so that need the checking write operation requests can be performed when being verified.
Aforesaid system write operation requests is carried out in the method for Authority Verification, and the Authority Verification of described need checking write operation requests is divided into the operation information extraction and two steps of operation information checking are specially,
A. the operation information extraction module extracts the request check information a1 that needs checking write operation requests a, and will ask check information a1 to deposit pending district in; Simultaneously, need checking write operation requests a to be let pass, obtain as a result b1 of pre-operation;
B. when needing checking write operation requests a to be about to when complete, the feature operation module is taken out the request check information a1 in pending district, then according to request check information a1 and pre-operation as a result b1 need checking write operation requests a is verified.
Aforesaid system write operation requests is carried out in the method for Authority Verification, and described request check information a1 comprises the source of request, requestor's identity, the tolerance band of operation and the requirement of checking.
Aforesaid system write operation requests is carried out in the method for Authority Verification, described feature operation module is taken out the request check information a1 in pending district, then be specially according to asking check information a1 and operating result b1 that need checking write operation requests a is verified, the feature operation module is verified need checking write operation requests a according to requirement and the operating result b1 of the checking among the request check information a1.
Aforesaid system write operation requests is carried out in the method for Authority Verification, describedly prepare and the correlation computations step when needing checking write operation requests a to be about to refer to when the write operation requests a that needs checking executes data when complete, when being about to carry out the operation acknowledgement step of saving result.
Compared with prior art, the present invention will verify that by the setting operation information extraction modules Authority Verification of write operation requests is divided into operation information extraction and two steps of operation information checking, letting pass simultaneously needs the checking write operation requests, so that need the checking write operation requests when being verified, can be performed, reduced the response time of operation.And the present invention is in that requirement and the pre-operation result according to the checking in the request check information carries out the checking of authority when needing the checking write operation requests to be about to when complete, the data of using during checking are exactly to calculate complete data to be written, guarantee checking and what write must be legitimacy and the security that same piece of data has guaranteed write operation to the full extent, increased the reliability of the result.
Description of drawings
Fig. 1 is process flow diagram of the present invention.
The present invention is further illustrated below in conjunction with drawings and Examples, but not as the foundation to the present invention's restriction.
Embodiment.
A kind of method of system's write operation requests being carried out Authority Verification, to verify that by the setting operation information extraction modules Authority Verification of write operation requests is divided into operation information extraction and two steps of operation information checking, letting pass simultaneously needs the checking write operation requests, so that need the checking write operation requests can be performed when being verified.
The Authority Verification of need checking write operation requests is divided into the operation information extraction and two steps of operation information checking are specially,
A. the operation information extraction module extracts the request check information a1 that needs checking write operation requests a, and will ask check information a1 to deposit pending district in; Simultaneously, need checking write operation requests a to be let pass, obtain as a result b1 of pre-operation;
B. when needing checking write operation requests a to be about to when complete, the feature operation module is taken out the request check information a1 in pending district, then according to request check information a1 and pre-operation as a result b1 need checking write operation requests a is verified.
Request check information a1 comprises the source of request, requestor's identity, the tolerance band of operation and the requirement of checking.The feature operation module is taken out the request check information a1 in pending district, then be specially according to asking check information a1 and operating result b1 that need checking write operation requests a is verified, the feature operation module is verified need checking write operation requests a according to requirement and the operating result b1 of the checking among the request check information a1.
Do specific description below in conjunction with concrete example.
The commodity purchasing function of 1: one shopping center of embodiment, businessman also has 1000 stocks; Registered user A need buy 900 goods, and the goods of businessman is sold 200 in purchasing process, also surplus 800.Restriction only has the registered user to buy, and businessman must in stockit is available user could buy, flow process as shown in Figure 1:
1, user A sends the request a that places an order
2, the operation information extraction module begins to extract relevant request check information a1, the source (being the people) that comprises request, requestor's identity (whether user), the requirement of the tolerance band of operation (whether registered user) and checking (businessman must in stockit is available user could buy) deposits pending district in;
3, feature operation module and the 2nd step carry out simultaneously, the inquiry Business Information, and merchandise news, inventory information generates interim order.
4, before interim acknowledgement of orders saves as order, the feature operation module extracts request check information a1 and interim order is verified, finds that businessman's goods is not enough, and this user A of the result can not buy 900 these article, order is abandoned, and returns prompting user and can only buy 800 goods.
And when using the conventional method that system's write operation requests is carried out Authority Verification to verify, owing to before buying, just authority is verified, so when interim acknowledgement of orders saves as order, system thinks that the enough users of the goods of businessman buy, this user A can buy these article as a result, do not square with the fact, checking was lost efficacy.
Embodiment 2.
The photo upload feature capability of a social network sites, system constraint must the registered user just can be uploaded the photo that is not more than the photograph album capacity, and the photograph album capacity of user A is surplus 500MB also, and the photograph album capacity of user A is contracted to 300MB in upload procedure.The user uploads the photo of 400MB, flow process as shown in Figure 1:
1, user A sends upload request a
2, the operation information extraction module begins to extract relevant request check information a1, the source (being the people) that comprises request, requestor's identity (whether registered user), the tolerance band of operation (user's star) and the requirement verified (must registered user just can upload the photo that is not more than the photograph album capacity) deposit pending district in;
3, feature operation module and the 2nd step carry out simultaneously, and photo upload to server, is preserved temporarily;
4, before photo was preserved, the feature operation module extracts request check information a1 and the interim photo of preserving verifies that the photograph album capacity of this user A of the result is merely able to upload the photo of 300MB, returned prompting user and uploaded unsuccessfully, asked the user to screen photo.
And when using the conventional method that system's write operation requests is carried out Authority Verification to verify, owing to before carrying out upload operation, just authority is verified, so the result user can upload the photo of 400MB, this user A uploads the photo of 400MB but only preserves the photo of 300MB as a result, all the other photos are lost, affect user's use, checking was lost efficacy.

Claims (4)

1. method of system's write operation requests being carried out Authority Verification, it is characterized in that: will verify that by the setting operation information extraction modules Authority Verification of write operation requests is divided into operation information extraction and two steps of operation information checking, letting pass simultaneously needs the checking write operation requests, so that need the checking write operation requests can be performed when being verified.
2. system according to claim 1 write operation requests is carried out the method for Authority Verification, it is characterized in that: the described Authority Verification that needs the checking write operation requests is divided into that operation information extracts and operation information verifies that two steps are specially,
A. the operation information extraction module extracts the request check information a1 that needs checking write operation requests a, and will ask check information a1 to deposit pending district in; Simultaneously, need checking write operation requests a to be let pass, obtain as a result b1 of pre-operation;
B. when needing checking write operation requests a to be about to when complete, the feature operation module is taken out the request check information a1 in pending district, then according to request check information a1 and pre-operation as a result b1 need checking write operation requests a is verified.
3. system according to claim 2 write operation requests is carried out the method for Authority Verification, and it is characterized in that: described request check information a1 comprises the source of request, requestor's identity, the tolerance band of operation and the requirement of checking.
4. system according to claim 3 write operation requests is carried out the method for Authority Verification, it is characterized in that: described feature operation module is taken out the request check information a1 in pending district, then be specially according to asking check information a1 and operating result b1 that need checking write operation requests a is verified, the feature operation module is verified need checking write operation requests a according to requirement and the operating result b1 of the checking among the request check information a1.
CN2012104843888A 2012-11-23 2012-11-23 Method for carrying out permission validation on write operation request of system Pending CN103020499A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012104843888A CN103020499A (en) 2012-11-23 2012-11-23 Method for carrying out permission validation on write operation request of system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012104843888A CN103020499A (en) 2012-11-23 2012-11-23 Method for carrying out permission validation on write operation request of system

Publications (1)

Publication Number Publication Date
CN103020499A true CN103020499A (en) 2013-04-03

Family

ID=47969096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012104843888A Pending CN103020499A (en) 2012-11-23 2012-11-23 Method for carrying out permission validation on write operation request of system

Country Status (1)

Country Link
CN (1) CN103020499A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110261616A1 (en) * 2010-04-26 2011-10-27 Mosaid Technologies Incorporated Write scheme in phase change memory
CN102546664A (en) * 2012-02-27 2012-07-04 中国科学院计算技术研究所 User and authority management method and system for distributed file system
CN202524458U (en) * 2012-04-13 2012-11-07 深圳市金立通信设备有限公司 Mobile phone information safety protection system based on fingerprint and navigation key superposition

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110261616A1 (en) * 2010-04-26 2011-10-27 Mosaid Technologies Incorporated Write scheme in phase change memory
CN102546664A (en) * 2012-02-27 2012-07-04 中国科学院计算技术研究所 User and authority management method and system for distributed file system
CN202524458U (en) * 2012-04-13 2012-11-07 深圳市金立通信设备有限公司 Mobile phone information safety protection system based on fingerprint and navigation key superposition

Similar Documents

Publication Publication Date Title
AU2020200682B2 (en) Systems and methods of secure provenance for distributed transaction databases
CN109889503B (en) Identity management method based on block chain, electronic device and storage medium
US9027094B1 (en) Associating data initially with devices and subsequently with accounts
CN105144217A (en) System and method for using multiple payment accounts using a single payment device
US10956972B2 (en) Account access system
CN105262780B (en) A kind of authority control method and system
CN102542695B (en) A kind of tax control liquid crystal USB flash disk with authentication and fingerprint recognition
WO2017157185A1 (en) Method and device for linking to account and providing service process
US11720866B1 (en) Transferring funds between two parties
PH12018500921A1 (en) System and method for facilitating electronic transactions
CN101799901B (en) Method for rapidly registering account, recharging and landing
WO2016107467A1 (en) Request sending method and device thereof
CN102685122B (en) The method of the software protection based on cloud server
CN106921708B (en) Group management method and device
CN105404799A (en) Authority management apparatus in information system
US20160224956A1 (en) Distributed digital rights-managed file transfer and access control
CN104537537A (en) Safety payment method based on Android system
CN107230080B (en) Service processing method and device and intelligent terminal
WO2019062220A1 (en) Fingerprint payment method and apparatus therefor, and user terminal
JP2017530492A (en) Authentication system and method
CN113269624A (en) Authentication and authorization method and device
CN104301284A (en) Multi-application smart card and multi-application management method for smart card
CN103020499A (en) Method for carrying out permission validation on write operation request of system
CN105741111A (en) Mobile payment method, system and device
CN102880819B (en) The cipher set-up method of the outer user of system, system and password arrange center

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130403