CN110138785A - A kind of processing method of document access authority, device, medium and electronic equipment - Google Patents

A kind of processing method of document access authority, device, medium and electronic equipment Download PDF

Info

Publication number
CN110138785A
CN110138785A CN201910411222.5A CN201910411222A CN110138785A CN 110138785 A CN110138785 A CN 110138785A CN 201910411222 A CN201910411222 A CN 201910411222A CN 110138785 A CN110138785 A CN 110138785A
Authority
CN
China
Prior art keywords
user
access
application
role
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910411222.5A
Other languages
Chinese (zh)
Inventor
蒋孟
王豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Bajie Electronic Commerce Co Ltd
Original Assignee
Chongqing Bajie Electronic Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Bajie Electronic Commerce Co Ltd filed Critical Chongqing Bajie Electronic Commerce Co Ltd
Priority to CN201910411222.5A priority Critical patent/CN110138785A/en
Publication of CN110138785A publication Critical patent/CN110138785A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of control methods of network legal power, comprising: response user access request obtains the authority information of the user, obtains the permission that the user accesses the default application, distributes to the permission of the corresponding access preset application of the user;And execute the access for having the user of access authority to the default application.The technical solution proposed through the invention, both the problem for the safety difference that directly accesses on the internet in service application had been can solve, it can also realize that same user has different access authority in different applications, facilitate and user role management is carried out according to the security level of application, solve in the prior art, the access authority of user it is all identical to all applications and caused by the high problem of security control difficulty.

Description

A kind of processing method of document access authority, device, medium and electronic equipment
Technical field
The present invention relates to field of computer technology, in particular to a kind of control method of network legal power, device, Jie Matter and electronic equipment.
Background technique
With the development of development of Mobile Internet technology, the network application in internet and network access more and more frequent, people Increasingly get used to accessing in internet various websites, using etc., some networks are open network, all may be used towards all users To access, some networks are internal network, only there is permission could access.
Originally the internal network traffic system of enterprise needs logging in VPN (Virtual Private Network) that can just access, operation It is cumbersome, if service application directly accesses on the internet, injection attacks loophole, security configuration mistake, failure will be faced Authentication, cross site scripting, sensitive information leakage, use the component containing known bugs, the safety such as access control of failure It threatens, causes operation system to be invaded, bring heavy losses to enterprise.
In addition, in the prior art, after usually same user authorizes access, permission be to all applications it is fixed, this leads It causes different to different security levels applications to be managed using same security level, is unfavorable for user experience and resource-effective.
Summary of the invention
The purpose of the present invention is to provide a kind of control method of network legal power, device, medium and electronic equipments, can solve At least one technical problem certainly mentioned above.
The embodiment of the present disclosure specifically discloses a kind of control method of network legal power, including:
User access request is responded, the authority information of the user is obtained;
Obtain the permission that the user accesses the default application;
Distribute to the permission of the corresponding access preset application of the user;And
Execute the access for having the user of access authority to the default application.
Further, the method further includes:
After the agency receives encryption data, it is decrypted and local permissions data is set and return to client.
Further, the access entrance control of the security gateway of the application be based on verify the local permissions data into Row setting, receives after the encryption data that security gateway is sent, acquisition user information is decrypted in the private key of domain name, and set It sets local authority information and returns to client, client carries local authority information and accesses, and judges the local authority information Legitimacy normally accessed if legal.
Further, the method further includes:
Client carries legal local permissions data, and the operation system of access agent rear end is normally accessed.
Further, the application to user's access authenticates, comprising:
Read the access authority information of the default application;
Verify the permission whether user possesses access preset application.
Further, the rights management of the default application is access control based roles design, the visit of the user It asks that request meets the role-security of the application, then carries out the access of corresponding role-security.
Further, the access request of the user meets one or more role-securities of the application;
The permission is associated with role, and user is obtained corresponding to the role by becoming the member in role Permission.
Further, the user has different user rights to the default application of difference.
Further, the access that there is the user of access authority corresponding authority is carried out to the application for the response, comprising:
The domain name of the application is entered into security gateway and automatically generates corresponding private key;
The private key of corresponding domain name is configured to agency, is associated with security gateway;
The access authority of operation system is distributed on security gateway to user;
User accesses business domain name, is verified, is normally accessed, and verifying does not pass through, and jumps to the user authentication page It is authenticated.
The embodiment of the present disclosure specifically discloses a kind of control device of network legal power, including:
Receiving unit responds user access request, obtains the authority information of the user;
Authenticating unit obtains the permission that the user accesses the default application;
Allocation unit distributes to the access authority of the corresponding default application of the user;And
Execution unit executes the access for having the user of access authority to the default application.
Further, described device further include:
Data cell returns to visitor for after agency receives encryption data, being decrypted and being arranged local permissions data Family end.
Further, the permission is associated with role, and user obtains the angle by becoming the member in role Permission corresponding to color, a user can possess multiple roles and corresponding function privilege.
Further, the user has different user rights to the default application of difference.
The technical solution proposed through the invention both can solve and directly access on the internet peace in service application The problem of full property difference can also realize that same user has different access authority in different applications, facilitate according to application Security level carries out user role management, solves in the prior art, and the access authority of user is all identical to all applications and causes The high problem of security control difficulty.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.It should be evident that the accompanying drawings in the following description is only the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 shows the flow chart of the processing method according to an embodiment of the present invention to document access authority;
Fig. 2 shows editable document element lattice according to an embodiment of the present invention to be selected status diagram.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
The term used in embodiments of the present invention is only to be not intended to be limiting merely for for the purpose of describing particular embodiments The present invention.In the embodiment of the present invention and the "an" of singular used in the attached claims, " described " and "the" It is also intended to including most forms, unless the context clearly indicates other meaning, " a variety of " generally comprise at least two.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, indicate There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three Situation.In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
It will be appreciated that though may be described in embodiments of the present invention using term first, second, third, etc.., But these ... it should not necessarily be limited by these terms.These terms be only used to by ... distinguish.For example, not departing from implementation of the present invention In the case where example range, first ... can also be referred to as second ..., and similarly, second ... can also be referred to as the One ....
Depending on context, word as used in this " if ", " if " can be construed to " ... when " or " when ... " or " in response to determination " or " in response to detection ".Similarly, context is depended on, phrase " if it is determined that " or " such as Fruit detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when detection (statement Condition or event) when " or " in response to detection (condition or event of statement) ".
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Include, so that commodity or device including a series of elements not only include those elements, but also including not clear The other element listed, or further include for this commodity or the intrinsic element of device.In the feelings not limited more Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or device for including the element also There are other identical elements.
Operational safety of the existing operation system in internet is mainly solved, realizes Network Isolation and authentication, it is ensured that only There is the user by authorization that could access operation system, accomplishes that real zero trusts.
The alternative embodiment that the invention will now be described in detail with reference to the accompanying drawings.
Embodiment 1
In server side, perform the following steps.
Step S101 responds user access request, obtains the authority information of the user;Specifically, user is preset Access request is sent to server in, server obtains user information based on the access request of user, specifically, service Device according to user request in include User ID, client server address, user, which requests access to range and gets, to be stored in advance in Corresponding authority information in server.
Step S102 obtains the permission that the user accesses the default application.Specifically, wherein the gateway in application Including access authority information related to user.The access authority information for reading the application, verifies whether the user possesses Access the permission of application.The rights management of the application is access control based roles design, the access request of the user Meet the role-security of the application, then carries out the access of corresponding role-security.The access request of the user is answered described in meeting One or more role-securities, the permission are associated with role, and user is obtained by becoming the member in role Obtain permission corresponding to the role.The authority information wherein applied is classified according to role, such as is weighed with administrator role Limit has the permission of circle circle control, can read and write, delete, the permissions such as parameter are arranged, control role permission can be read and write, delete Etc. permissions, visitor's permission, only have read or access limit.The permission of certain each role, administrator role have the right to be adjusted and Control.The rights management of the application is access control based roles design, is answered described in the access request satisfaction of the user Role-security then carries out the access of corresponding role-security.The access request of the user meet the application one kind or Various rolls permission.Wherein, different default applications can be different the role of same user, such as in application 1, user 1 is administrator and user 2 is conventional character, and in application 2, user 2 can be administrator and user 1 is conventional character.In addition, Different secure access permissions, such as application to sensitive information is not included can also be set for different application, answered due to this kind of It is lower with security level, it can be to the open permission for corresponding to role of user, for the application comprising important sensitive information, to this kind of Using needing to focus more on its safety, therefore the permission of relevant user is only opened, through same user for different application Different roles is distributed, facilitates and user role management is carried out according to the security level of application.
Step S103 distributes to the permission of the corresponding access preset application of the user.Sentenced according to the authority information of application Whether the user of breaking has access authority.When application permission information includes the access information of the corresponding user, then user gathers around There is the access authority of corresponding authority.For example, user is administrator role, then application system gives distribution administrator right, if with Family is control role or visitor role, then application system is to the corresponding control authority of distribution or visitor's permission.
Step S104 executes the access for having the user of access authority to the default application.Specifically, user is accessing Using when, need to operate application, the users of different rights implements the operation of corresponding authority.By the domain of the application Name is entered into security gateway and automatically generates corresponding private key;The private key of corresponding domain name is configured to agency, with security gateway into Row association;The access authority of default application is distributed on security gateway to user;User accesses business domain name, is verified, into The normal access of row, verifying do not pass through, jump to the user authentication page and authenticated.
And when the permission modification of application, need monitoring right to change message, it, will if the application permission information has altered Described that corresponding authority information is applied to be recorded in the search library, each authority records information is a user/group ID Set, by receiving and extracting the change message, is updated in gateway.
And when the role of application and user correspond to distribution condition and change, it can also notify institute in time in the background State user.
Further, the authority control method of the network further comprises:
After agency receives encryption data, it is decrypted and local permissions data is set and return to client.The application The access entrance control of security gateway is configured based on the verification local permissions data, is received and is sent from security gateway Encryption data after, acquisition user information is decrypted in the private key of domain name, and local authority information is set and returns to client, visitor Family end carries local authority information and accesses, and judges the legitimacy of the local authority information, if legal, carries out normal Access.
The rights management of security gateway is access control based roles design.Permission is associated with role, and permission is not It is associated between user, user obtains permission corresponding to the role by becoming the member in role.So if one A user possesses multiple roles, he just possesses the function privilege of multiple roles.Based role is realized in systematic difference program layer Digital right management scheme, simple, safe and efficient management is realized to the access authority of system, significantly reduce system power The burden and cost of management are limited, and System right management is made to be more in line with the service management specification of application system.
Next, the access entrance control of security gateway is set based on the local authority information (cookie information) of verification Meter receives the encryption data sent from security gateway, acquisition user information then is decrypted in the private key of domain name, and be arranged Local authority information returns to client, and client carries local authority information and accesses, and judges the legal of local authority information Property, normally accessed.
Finally, the domain name of operation system is entered into security gateway system and automatically generates corresponding private key (KEY is used for Encryption and decryption certification), the private key of corresponding domain name is then configured to agency, is associated with security gateway, administrator is in safety net The access authority of distribution operation system is shut to user, user accesses business domain name, is verified, normally accessed, and verifies Do not pass through, jumps to the user authentication page and authenticated.
By the above method, both can solve service application directly access on the internet safety difference ask Topic can also realize that same user has different access authority in different applications, facilitate according to the security level of application into Row user role management solves in the prior art, the access authority of user it is all identical to all applications and caused by security control The high problem of difficulty.
Embodiment 2
Specific embodiment according to the present invention, second aspect, the present invention provide a kind of processing dress of document access authority It sets, in server end, it can be enterprise that server, which carries out the extraction and record to user information for receiving retrieval request, Or personal server, or cloud server.Include:
Receiving unit 301 responds user access request, obtains the authority information of the user.
Authenticating unit 302 obtains the permission that the user accesses the default application.
Allocation unit 303 distributes to the access authority of the corresponding default application of the user.
Execution unit 304 executes the access for having the user of access authority to the default application.
Further, described device further include:
Data cell, for after agency receives encryption data, be decrypted and be arranged local permissions data return to it is clear Look at device.
Embodiment 3
The present embodiment provides a kind of electronic equipment, which is used for the processing method of document access authority, and the electronics is set It is standby, comprising: at least one processor;And the memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by one processor, and described instruction is by described at least one Manage device execute so that at least one described processor can:
In response to receiving the request of search file from user, the information of the user is determined;
Determine document authority information;
Judge whether the user has access authority according to the document authority information;And
There is the document of access authority to show relative to the user for what is retrieved.
Specific processing mode can be found in embodiment 1 and embodiment 2.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Embodiment 4
The embodiment of the present disclosure provides a kind of nonvolatile computer storage media, and the computer storage medium is stored with The control of the network legal power in above-mentioned any means embodiment can be performed in computer executable instructions, the computer executable instructions Method.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not It is fitted into the electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by the electricity When sub- equipment executes, so that the electronic equipment: obtaining at least two internet protocol addresses;Send to Node evaluation equipment includes institute State the Node evaluation request of at least two internet protocol addresses, wherein the Node evaluation equipment is internet from described at least two In protocol address, chooses internet protocol address and return;Receive the internet protocol address that the Node evaluation equipment returns;Its In, the fringe node in acquired internet protocol address instruction content distributing network.
Alternatively, above-mentioned computer-readable medium carries one or more program, when said one or multiple programs When being executed by the electronic equipment, so that the electronic equipment: receiving the Node evaluation including at least two internet protocol addresses and request; From at least two internet protocol address, internet protocol address is chosen;Return to the internet protocol address selected;Wherein, The fringe node in internet protocol address instruction content distributing network received.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+ +, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package, Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions, for example, the One acquiring unit is also described as " obtaining the unit of at least two internet protocol addresses ".

Claims (15)

1. a kind of control method of network legal power characterized by comprising
User access request is responded, the authority information of the user is obtained;
Obtain the permission that the user accesses the default application;
Distribute to the permission of the corresponding access preset application of the user;And
Execute the access for having the user of access authority to the default application.
2. the method according to claim 1, wherein the method further includes:
After the agency receives encryption data, it is decrypted and local permissions data is set and return to client.
3. according to the method described in claim 2, it is characterized in that,
The access entrance control of the security gateway of the application is configured based on the verification local permissions data, is received and From after the encryption data that security gateway is sent, acquisition user information is decrypted in the private key of domain name, and local permission letter is set Breath returns to client, and client carries local authority information and accesses, and judges the legitimacy of the local authority information, if It is legal, then it is normally accessed.
4. the method according to claim 1, wherein the method further includes:
Client carries legal local permissions data, and the operation system of access agent rear end is normally accessed.
5. the method according to claim 1, wherein the application to user's access authenticates, comprising:
Read the access authority information of the default application;
Verify the permission whether user possesses access preset application.
6. according to the method described in claim 1, it is characterized by:
The rights management of the default application is that access control based roles design, described in the access request satisfaction of the user The role-security of application then carries out the access of corresponding role-security.
7. according to the method described in claim 6, it is characterized in that,
The access request of the user meets one or more role-securities of the application;
The permission is associated with role, and user obtains power corresponding to the role by becoming the member in role Limit.
8. according to the method described in claim 6, it is characterized in that,
The user has different user rights to the default application of difference.
9. the method according to claim 1, wherein the response has the user of access authority to the application Carry out the access of corresponding authority, comprising:
The domain name of the application is entered into security gateway and automatically generates corresponding private key;
The private key of corresponding domain name is configured to agency, is associated with security gateway;
The access authority of operation system is distributed on security gateway to user;
User accesses business domain name, is verified, is normally accessed, and verifying does not pass through, and jumps to the progress of the user authentication page Certification.
10. a kind of control device of network legal power characterized by comprising
Receiving unit responds user access request, obtains the authority information of the user;
Authenticating unit obtains the permission that the user accesses the default application;
Allocation unit distributes to the access authority of the corresponding default application of the user;And
Execution unit executes the access for having the user of access authority to the default application.
11. device according to claim 10, which is characterized in that described device further include:
Data cell returns to client for after agency receives encryption data, being decrypted and being arranged local permissions data.
12. device according to claim 11, it is characterised in that:
The permission is associated with role, and user obtains power corresponding to the role by becoming the member in role Limit, a user can possess multiple roles and corresponding function privilege.
13. device according to claim 12, it is characterised in that:
The user has different user rights to the default application of difference.
14. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed Device realizes method as claimed in any one of claims 1-9 wherein when executing.
15. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more computer programs, when one or more of computer programs are by institute When stating one or more processors execution, so that one or more of processors are realized such as any one of claims 1 to 9 institute The method stated.
CN201910411222.5A 2019-05-16 2019-05-16 A kind of processing method of document access authority, device, medium and electronic equipment Pending CN110138785A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910411222.5A CN110138785A (en) 2019-05-16 2019-05-16 A kind of processing method of document access authority, device, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910411222.5A CN110138785A (en) 2019-05-16 2019-05-16 A kind of processing method of document access authority, device, medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN110138785A true CN110138785A (en) 2019-08-16

Family

ID=67574853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910411222.5A Pending CN110138785A (en) 2019-05-16 2019-05-16 A kind of processing method of document access authority, device, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110138785A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046354A (en) * 2019-11-05 2020-04-21 京东数字科技控股有限公司 Access and client access management method, system and medium
CN111444483A (en) * 2020-03-26 2020-07-24 杭州指令集智能科技有限公司 Authentication method, device and equipment
CN111898149A (en) * 2020-08-05 2020-11-06 湖南优美科技发展有限公司 User management system and method for multiple organizations
CN112100675A (en) * 2020-11-05 2020-12-18 南京云信达科技有限公司 Zero-trust data storage access method and system
CN112866293A (en) * 2021-03-05 2021-05-28 武汉思普崚技术有限公司 Gateway equipment system administrator authority management method and device
CN113938951A (en) * 2021-11-30 2022-01-14 中国联合网络通信集团有限公司 Zero trust based service processing method and server

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881108A (en) * 2017-05-09 2018-11-23 北京京东尚科信息技术有限公司 The method and apparatus of rights management

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881108A (en) * 2017-05-09 2018-11-23 北京京东尚科信息技术有限公司 The method and apparatus of rights management

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046354A (en) * 2019-11-05 2020-04-21 京东数字科技控股有限公司 Access and client access management method, system and medium
CN111444483A (en) * 2020-03-26 2020-07-24 杭州指令集智能科技有限公司 Authentication method, device and equipment
CN111898149A (en) * 2020-08-05 2020-11-06 湖南优美科技发展有限公司 User management system and method for multiple organizations
CN111898149B (en) * 2020-08-05 2023-12-22 湖南优美科技发展有限公司 User management system and method for multiple organizations
CN112100675A (en) * 2020-11-05 2020-12-18 南京云信达科技有限公司 Zero-trust data storage access method and system
CN112866293A (en) * 2021-03-05 2021-05-28 武汉思普崚技术有限公司 Gateway equipment system administrator authority management method and device
CN113938951A (en) * 2021-11-30 2022-01-14 中国联合网络通信集团有限公司 Zero trust based service processing method and server
CN113938951B (en) * 2021-11-30 2023-06-02 中国联合网络通信集团有限公司 Service processing method and server based on zero trust

Similar Documents

Publication Publication Date Title
AU2019206006B2 (en) System and method for biometric protocol standards
CN110138785A (en) A kind of processing method of document access authority, device, medium and electronic equipment
CN105141614B (en) A kind of access right control method and device of movable storage device
Pasquale et al. Topology aware adaptive security
US20160057168A1 (en) System and methods for efficient network security adjustment
CN113542201B (en) Access control method and equipment for Internet service
JP2017513274A (en) System and method for providing secure access to local network devices
CN101827101A (en) Information asset protection method based on credible isolated operating environment
Soares et al. Cloud security: state of the art
US10637864B2 (en) Creation of fictitious identities to obfuscate hacking of internal networks
Babu et al. An analysis of security related issues in cloud computing
US9338137B1 (en) System and methods for protecting confidential data in wireless networks
Meetei et al. Security issues in cloud computing
US9635017B2 (en) Computer network security management system and method
CN116319024A (en) Access control method and device of zero trust system and zero trust system
Maghrabi The threats of data security over the Cloud as perceived by experts and university students
James et al. Digital forensic investigation and cloud computing
US20090204544A1 (en) Activation by trust delegation
US11336667B2 (en) Single point secured mechanism to disable and enable the access to all user associated entities
Raisian et al. Security issues model on cloud computing: A case of Malaysia
Lin et al. Secure logging framework integrating with cloud database
Basso et al. Requirements, design and evaluation of a privacy reference architecture for web applications and services
Olsson et al. 5G zero trust–A Zero-Trust Architecture for Telecom
KR102202109B1 (en) Questionnaire security system and method by multi-authorization
Jang Derivation of Security Requirements for Cloud Managing Security Services System by Threat Modeling Analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190816