CN102004868A - Role access control-based information system data storage layer and building method - Google Patents
Role access control-based information system data storage layer and building method Download PDFInfo
- Publication number
- CN102004868A CN102004868A CN2009101949427A CN200910194942A CN102004868A CN 102004868 A CN102004868 A CN 102004868A CN 2009101949427 A CN2009101949427 A CN 2009101949427A CN 200910194942 A CN200910194942 A CN 200910194942A CN 102004868 A CN102004868 A CN 102004868A
- Authority
- CN
- China
- Prior art keywords
- user
- role
- data
- data table
- infosystem
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a role access control-based information system data storage layer and a building method. User name, password and login times of information system registered users are stored through a user data table; a plurality of roles with access authorities of different levels are stored through a role data table; and a matching relationship between the users and the roles is stored through a user and role relationship data table. The data tables of the data storage layer are called by an information system to realize modification of system user information and matching between the users and the roles and further fulfill the purpose of endowing and controlling the access authorities of the users.
Description
Technical field
The present invention relates to the data information system data storage technology, more particularly, relate to a kind of data of information system accumulation layer and construction method based on role access control.
Background technology
At present increasing need of work uses various infosystems, and the security of infosystem more and more obtains people's attention, for example aspect the access control of infosystem, just need to pay attention to its security, in an infosystem, have the different various users of rank, specific user can only visit specific data, if and safety practice is not in place, the user can be occurred so and the data that it should not be visited can be had access to, thereby cause accident such as divulge a secret, cause the loss that is difficult to retrieve just may for country and enterprise.
As seen need carry out the design of related security policies for the user capture of infosystem, thereby reach the purpose that the visit of different user is controlled.Relevant security strategy comprises the user's control strategy based on role authorization, and for using this tactful infosystem, its data storage layer also is a problem to be solved.
Summary of the invention
The object of the present invention is to provide a kind of data of information system accumulation layer and construction method based on role access control, the tables of data by this data storage layer realizes purpose that the visit of different user is controlled.
According to a first aspect of the invention, provide a kind of data of information system accumulation layer, comprising based on role access control:
User data table is in order to user name, password and the login times of storing described infosystem registered user;
The role data table, in order to store some roles with different stage access rights, described each role's access rights comprise the set of some access profiles of described data of information system;
User and role relation tables of data are in order to store described user and role's matching relationship.
Described user data table in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
Interpolation role and the deletion role of described role data table in order to realize described infosystem, described role data table character stored name is as the major key with unique ID of this tables of data.
Described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
On the other hand, the present invention also provides a kind of construction method of the data of information system accumulation layer based on role access control, may further comprise the steps:
Set up user data table, make its user name of storing described infosystem registered user, password and login times;
Set up the role data table, make its some roles with different stage access rights of storage, described each role's access rights comprise the set of some access profiles of described data of information system;
Set up user and role relation tables of data, make it store described user and role's matching relationship;
Described infosystem user data, role data and user and role relation data are write the data storage layer of described tables of data formation based on data table stores.
Described user data table in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
Interpolation role and the deletion role of described role data table in order to realize described infosystem, described role data table character stored name is as the major key with unique ID of this tables of data.
Described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
Adopt a kind of data of information system accumulation layer and construction method of the present invention based on role access control, store described infosystem registered user's user name, password and login times by user data table, by the some roles of role data table storage, by user and described user of role relation data table stores and role's matching relationship with different stage access rights.These tables of data of this data storage layer are called for infosystems, realize the coupling between modification, user and the role of system user information, and then realize purpose that user's access rights are given and controlled.
Description of drawings
Fig. 1 is the theory diagram of data storage layer of the present invention;
Fig. 2 is the process flow diagram of the method for the invention;
Fig. 3 is the process flow diagram based on role authorization of the present invention.
Embodiment
Further specify technical scheme of the present invention below in conjunction with drawings and Examples, describe by the present invention is applied in graduate's management system.
With reference to figure 1, Fig. 1 has shown a kind of data of information system accumulation layer 100 based on role access control, comprises user data table 101, role data table 102 and user and role relation tables of data 103, is introduced successively below:
User data table 101, user name, password and login times and student number or job number in order to store described infosystem registered user see Table 1.Described user data table 101 in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table 101 storages adds one in the described infosystem of the every login of described user after once.
Table 1-user data table
The row name | Data type | Allow empty |
Name (major key) | Nvarchar(20) | Not |
password | Nvarchar(20) | Not |
counts | Numeric(18,0) | Be |
idmap | Nvarchar(10) | Not |
User name when the name in the table 1 represents that the user logins, data type is that length is the character types of 20 characters, user name does not allow sky certainly.Password is exactly the password of user when logining, and the same of data type and name also is that length is the character types of 20 characters.Counts represents user's login times, adds one after the every login once of user, and data type is that length is 18, the numeric type that fraction part is 0.Idmap represents user's student number or job number, and data type is that length is the character types of 10 characters.
Role data table 102, in order to store some roles with different stage access rights, described each role's access rights comprise the set of some access profiles of described data of information system, see Table 2.Interpolation role and the deletion role of described role data table 102 in order to realize described infosystem, described role data table 102 character stored name is as the major key with unique ID of this tables of data.
Table 2-role data table
The row name | Data type | Allow empty |
Rolename (major key) | Nvarchar(20) | Not |
Rolename represents role name in the table, and data type is that length is the character types of 20 characters, does not allow for sky.
User and role relation tables of data 103 in order to store described user and role's matching relationship, see Table 3.Described user and role relation tables of data 103 are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user that described user and role relation tables of data 103 are stored and role's matching relationship comprises one to one, one-to-many and many-one.
Table 3-user and role relation tables of data
The row name | Data type | Allow empty |
ID (major key) | Numeric(18,0) | Not |
Name | Nvarchar(20) | Not |
Role | Nvarchar(20) | Not |
ID in the table represents serial number, because the corresponding relation between name and the role is not one to one, so need a unique ID to be used as major key.
Referring to Fig. 2, the present invention also provides a kind of construction method 200 of the data of information system accumulation layer based on role access control, may further comprise the steps:
201, set up user data table, make its user name of storing described infosystem registered user, password and login times.
Described user data table in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
202, set up the role data table, make its some roles with different stage access rights of storage, described each role's access rights comprise the set of some access profiles of described data of information system.
Interpolation role and the deletion role of described role data table in order to realize described infosystem, described role data table character stored name is as the major key with unique ID of this tables of data.
203, set up user and role relation tables of data, make it store described user and role's matching relationship.
Described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
204, described infosystem user data, role data and user and role relation data are write the data storage layer of described tables of data formation based on data table stores.
Introduce data storage layer below based on the described infosystem of above-mentioned tables of data, it is how mating information system call, realize the coupling between modification, user and the role of system user information, and then realize purpose that user's access rights are given and controlled.
Set up the user class file of described infosystem, make described user class file comprise the method for handling the described user data table of operation; Call described user class file, described user class file by in the data analysis layer that returns described infosystem to data accumulation layer method of operating realize operation to described user data table, described operation comprise add user, deletion user, update user information, according to the user name inquiry and return certain user profile.The user class file is made as the User class when specifically setting up, wherein comprise add user, deletion user, update user information, according to the user name inquiry and return method such as certain user profile.Such is mainly by returning in DAL layer (data analysis layer) the SLogin class data accumulation layer method of operating, realizes the function that needs, thereby has guaranteed the security of data storage layer.By following code structure, the backstage code of the page only need call the function that methods such as interpolation in the User class, deletion just just can realize correspondence.When realizing registering functional, at first set up a SLogin model, obtain all information of this model, set up the object of an operation then, call adding method again and get final product as needs.Its specific code is as follows:
SLogin?mySLogin=new?SLogin();
mySLogin.name=name.Text.Trim();
mySLogin.password=name.Text.Trim();
mySLogin.idmap=name.Text.Trim();
Users?opUser=new?Users();
opUser.CreatUser(mySLogin);
Also similar this structure of all the other function codes.
Set up the role class file of described infosystem, make described role class file comprise the method for handling the described role data table of operation.Call described role class file, described role class file is by realizing operation to described role data table to data accumulation layer method of operating in the data analysis layer that returns described infosystem, and described operation comprises to be added role, deletion role and judge whether to exist certain role.The role class file is made as the roles class when specifically setting up, wherein comprise to add role, deletion role and judge whether to exist method such as certain role.Method in such also is to realize concrete function by the method for returning in the DAL layer.When realizing corresponding function, set up the model of a SRoleLib equally earlier and obtain relevant information, just can realize the function of being correlated with by the correlation technique that calls Roles class the inside then.
Set up the user and the role relation class file of described infosystem, make described user and role relation class file comprise the method for handling described user of operation and role relation tables of data.Call described user and role relation class file, described user and role relation class file by in the data analysis layer that returns described infosystem to data accumulation layer method of operating realize operation to described user and role relation tables of data, described operation comprise to the role add the user, return certain all role of user set, return the given role of one group of user's user name coupling, from certain role, delete one group of user.User and role relation class file are made as the Users-Roles class when specifically setting up, the Users-Roles class is exactly the class that user and role are connected, wherein to the role add the user, return certain all role of user set, return the given role of their user name coupling of one group of user, one group of method such as user of deletion from certain role.Method in such also is to realize concrete function by the method for returning SRole class in the DAL layer.When realizing corresponding function, set up the model of a SRole equally earlier and obtain relevant information, just can realize the function of being correlated with by the correlation technique that calls Users-Roles class the inside then.
Referring to 3, here introduce the application of mandate in role access control, mandate (role-based authorization) based on the role, this authorization is not to authorize according to the user, but by distributing role (role) to the user, thereby by being set, the authority that the role has realizes giving subscriber authorisation again.As seen from Figure 2, its process is divided into: user role distributes, and role-security distributes and according to this several steps of limiting operation.
It is to be noted, construction method 200 and a kind of data of information system accumulation layer 100 of the present invention of a kind of data of information system accumulation layer based on role access control of the present invention based on role access control, both are being identical or similar aspect principle and the embodiment, so both repeating parts repeat no more.
Those of ordinary skill in the art will be appreciated that, above embodiment is used for illustrating the present invention, and be not to be used as limitation of the invention, as long as in connotation scope of the present invention, all will drop in claims scope of the present invention variation, the modification of above embodiment.
Claims (8)
1. the data of information system accumulation layer based on role access control is characterized in that, comprising:
User data table is in order to user name, password and the login times of storing described infosystem registered user;
The role data table, in order to store some roles with different stage access rights, described each role's access rights comprise the set of some access profiles of described data of information system;
User and role relation tables of data are in order to store described user and role's matching relationship.
2. data storage layer as claimed in claim 1, it is characterized in that, described user data table is in order to realize user's registration, interpolation user and the deletion user of described infosystem, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
3. data storage layer as claimed in claim 1 or 2 is characterized in that, interpolation role and the deletion role of described role data table in order to realize described infosystem, and described role data table character stored name is as the major key with unique ID of this tables of data.
4. data storage layer as claimed in claim 3, it is characterized in that, described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
5. the construction method based on the data of information system accumulation layer of role access control is characterized in that, may further comprise the steps:
Set up user data table, make its user name of storing described infosystem registered user, password and login times;
Set up the role data table, make its some roles with different stage access rights of storage, described each role's access rights comprise the set of some access profiles of described data of information system;
Set up user and role relation tables of data, make it store described user and role's matching relationship;
Described infosystem user data, role data and user and role relation data are write the data storage layer of described tables of data formation based on data table stores.
6. method as claimed in claim 5, it is characterized in that, described user data table in order to the user registration that realizes described infosystem, add user and deletion user, user's login times of described user data table storage adds one in the described infosystem of the every login of described user after once.
7. as claim 5 or 6 described methods, it is characterized in that, interpolation role and the deletion role of described role data table in order to realize described infosystem, described role data table character stored name is as the major key with unique ID of this tables of data.
8. method as claimed in claim 7, it is characterized in that, described user and role relation tables of data are carried out the operation that described role adds user, deletion user role and inquiring user role in order to realize described infosystem, the user of described user and role relation data table stores and role's matching relationship comprises one to one, one-to-many and many-one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101949427A CN102004868A (en) | 2009-09-01 | 2009-09-01 | Role access control-based information system data storage layer and building method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101949427A CN102004868A (en) | 2009-09-01 | 2009-09-01 | Role access control-based information system data storage layer and building method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102004868A true CN102004868A (en) | 2011-04-06 |
Family
ID=43812225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009101949427A Pending CN102004868A (en) | 2009-09-01 | 2009-09-01 | Role access control-based information system data storage layer and building method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102004868A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102194169A (en) * | 2011-05-19 | 2011-09-21 | 深圳市路特斯网络技术有限公司 | Unified communication management method and system |
CN102402663A (en) * | 2011-12-01 | 2012-04-04 | 浪潮电子信息产业股份有限公司 | Method for customizing role authorization in management information system |
CN102567675A (en) * | 2012-02-15 | 2012-07-11 | 合一网络技术(北京)有限公司 | User authority management method and system in business system |
CN102611699A (en) * | 2012-02-22 | 2012-07-25 | 浪潮(北京)电子信息产业有限公司 | Method and system for access control in cloud operation system |
CN105022941A (en) * | 2015-06-24 | 2015-11-04 | 上海斐讯数据通信技术有限公司 | Management method and system of username password |
CN106178509A (en) * | 2016-07-07 | 2016-12-07 | 深圳市豹风网络股份有限公司 | The game role digital data recording system of mobile terminal network game |
CN106850512A (en) * | 2015-12-07 | 2017-06-13 | 北京航天长峰科技工业集团有限公司 | A kind of information system design method for meeting cascade protection requirement |
CN107103228A (en) * | 2017-04-22 | 2017-08-29 | 成都牵牛草信息技术有限公司 | Man-to-man permission grant method and system of the based role to user |
CN107844711A (en) * | 2017-10-16 | 2018-03-27 | 平安科技(深圳)有限公司 | Data manipulation authority partition method, application server and computer-readable recording medium |
CN108280365A (en) * | 2017-09-19 | 2018-07-13 | 平安科技(深圳)有限公司 | Data access authority management method, device, terminal device and storage medium |
CN108711037A (en) * | 2017-05-27 | 2018-10-26 | 成都牵牛草信息技术有限公司 | The commission of examination and approval workflow and its recommit method |
CN108764826A (en) * | 2017-05-16 | 2018-11-06 | 成都牵牛草信息技术有限公司 | The method of workflow approval node setting examination & approval role based on form fields |
CN108830565A (en) * | 2017-06-30 | 2018-11-16 | 成都牵牛草信息技术有限公司 | The menu authorization method of based role |
CN108875054A (en) * | 2017-07-07 | 2018-11-23 | 成都牵牛草信息技术有限公司 | The field value-acquiring method of role's property field in list |
CN108898317A (en) * | 2017-07-01 | 2018-11-27 | 成都牵牛草信息技术有限公司 | The method that list operating right is authorized respectively according to form field values |
CN108920915A (en) * | 2017-07-05 | 2018-11-30 | 成都牵牛草信息技术有限公司 | Form field values operating right authorization method |
CN109033861A (en) * | 2017-08-07 | 2018-12-18 | 成都牵牛草信息技术有限公司 | The method that authorised operator is authorized in system |
CN113032770A (en) * | 2021-04-14 | 2021-06-25 | 湖南快乐阳光互动娱乐传媒有限公司 | User classification authority management method and device and intelligent terminal |
US11507679B2 (en) | 2017-07-01 | 2022-11-22 | Chengdu Qianniucao Information Technology Co., Ltd. | Authorization method for form related information |
-
2009
- 2009-09-01 CN CN2009101949427A patent/CN102004868A/en active Pending
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102194169A (en) * | 2011-05-19 | 2011-09-21 | 深圳市路特斯网络技术有限公司 | Unified communication management method and system |
CN102194169B (en) * | 2011-05-19 | 2013-09-04 | 深圳市路特斯网络技术有限公司 | Unified communication management method and system |
CN102402663A (en) * | 2011-12-01 | 2012-04-04 | 浪潮电子信息产业股份有限公司 | Method for customizing role authorization in management information system |
CN102567675A (en) * | 2012-02-15 | 2012-07-11 | 合一网络技术(北京)有限公司 | User authority management method and system in business system |
CN102567675B (en) * | 2012-02-15 | 2015-09-30 | 合一网络技术(北京)有限公司 | Method for managing user right under a kind of operation system and system |
CN102611699A (en) * | 2012-02-22 | 2012-07-25 | 浪潮(北京)电子信息产业有限公司 | Method and system for access control in cloud operation system |
CN105022941A (en) * | 2015-06-24 | 2015-11-04 | 上海斐讯数据通信技术有限公司 | Management method and system of username password |
CN106850512A (en) * | 2015-12-07 | 2017-06-13 | 北京航天长峰科技工业集团有限公司 | A kind of information system design method for meeting cascade protection requirement |
CN106178509A (en) * | 2016-07-07 | 2016-12-07 | 深圳市豹风网络股份有限公司 | The game role digital data recording system of mobile terminal network game |
CN107103228B (en) * | 2017-04-22 | 2021-02-02 | 成都牵牛草信息技术有限公司 | Role-based one-to-one authorization method and system for user permission |
CN107103228A (en) * | 2017-04-22 | 2017-08-29 | 成都牵牛草信息技术有限公司 | Man-to-man permission grant method and system of the based role to user |
CN108764826A (en) * | 2017-05-16 | 2018-11-06 | 成都牵牛草信息技术有限公司 | The method of workflow approval node setting examination & approval role based on form fields |
CN108764826B (en) * | 2017-05-16 | 2022-04-22 | 成都牵牛草信息技术有限公司 | Method for setting approval roles of workflow approval nodes based on form fields |
CN108711037A (en) * | 2017-05-27 | 2018-10-26 | 成都牵牛草信息技术有限公司 | The commission of examination and approval workflow and its recommit method |
CN108711037B (en) * | 2017-05-27 | 2021-12-17 | 成都牵牛草信息技术有限公司 | Delegation and re-delegation method for approval workflow |
CN108830565A (en) * | 2017-06-30 | 2018-11-16 | 成都牵牛草信息技术有限公司 | The menu authorization method of based role |
WO2019001322A1 (en) * | 2017-06-30 | 2019-01-03 | 成都牵牛草信息技术有限公司 | Role-based menu authorization method |
US11507679B2 (en) | 2017-07-01 | 2022-11-22 | Chengdu Qianniucao Information Technology Co., Ltd. | Authorization method for form related information |
CN108898317A (en) * | 2017-07-01 | 2018-11-27 | 成都牵牛草信息技术有限公司 | The method that list operating right is authorized respectively according to form field values |
CN108898317B (en) * | 2017-07-01 | 2021-04-06 | 成都牵牛草信息技术有限公司 | Method for respectively authorizing form operation authority according to form field values |
WO2019007291A1 (en) * | 2017-07-01 | 2019-01-10 | 成都牵牛草信息技术有限公司 | Method for granting form operation authority respectively according to form field values |
CN108920915B (en) * | 2017-07-05 | 2021-10-29 | 成都牵牛草信息技术有限公司 | Form field value operation authority authorization method |
CN108920915A (en) * | 2017-07-05 | 2018-11-30 | 成都牵牛草信息技术有限公司 | Form field values operating right authorization method |
US11507651B2 (en) | 2017-07-05 | 2022-11-22 | Chengdu Qianniucao Information Technology Co., Ltd. | Method for authorizing operation permissions of form-field values |
WO2019007261A1 (en) * | 2017-07-07 | 2019-01-10 | 成都牵牛草信息技术有限公司 | Method for obtaining field value of character property field in form |
CN108875054A (en) * | 2017-07-07 | 2018-11-23 | 成都牵牛草信息技术有限公司 | The field value-acquiring method of role's property field in list |
CN108875054B (en) * | 2017-07-07 | 2021-04-09 | 成都牵牛草信息技术有限公司 | Method for acquiring field value of role property field in form |
CN109033861A (en) * | 2017-08-07 | 2018-12-18 | 成都牵牛草信息技术有限公司 | The method that authorised operator is authorized in system |
CN109033861B (en) * | 2017-08-07 | 2022-03-22 | 成都牵牛草信息技术有限公司 | Method for authorizing authorized operator in system |
US11824865B2 (en) | 2017-08-07 | 2023-11-21 | Chengdu Qianniucao Information Technology Co., Ltd. | Method for authorizing authorization operator in system |
CN108280365B (en) * | 2017-09-19 | 2019-04-12 | 平安科技(深圳)有限公司 | Data access authority management method, device, terminal device and storage medium |
CN108280365A (en) * | 2017-09-19 | 2018-07-13 | 平安科技(深圳)有限公司 | Data access authority management method, device, terminal device and storage medium |
CN107844711A (en) * | 2017-10-16 | 2018-03-27 | 平安科技(深圳)有限公司 | Data manipulation authority partition method, application server and computer-readable recording medium |
CN107844711B (en) * | 2017-10-16 | 2019-06-07 | 平安科技(深圳)有限公司 | Data manipulation permission partition method, application server and computer readable storage medium |
CN113032770A (en) * | 2021-04-14 | 2021-06-25 | 湖南快乐阳光互动娱乐传媒有限公司 | User classification authority management method and device and intelligent terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102004868A (en) | Role access control-based information system data storage layer and building method | |
CN102004866A (en) | Method and device for user identity verification and access control of information system | |
CN101952830A (en) | Methods and systems for user authorization | |
CN100495422C (en) | Controlling method of business operations authority | |
CN101971184B (en) | Client/server system for communicating according to the standard protocol OPC UA and having single sign-on mechanisms for authenticating, and method for performing single sign-on in such a system | |
CN101478398B (en) | Authorization management system oriented to resource management and establishing method | |
CN102752741B (en) | To the method, system and device of protecting terminal data | |
CN104966340A (en) | Access control system, access control method and cloud service platform | |
CN101754182A (en) | Packed-based network contact list implementation method and system | |
CN103065074A (en) | Uniform Resource Locator (URL) authority control method based on fine granularity | |
CN103078859A (en) | Service system authority management method, equipment and system | |
CN102468971A (en) | Authority management method and device, and authority control method and device | |
CN102438019A (en) | Business information system access authority control method and system thereof | |
CN102402663A (en) | Method for customizing role authorization in management information system | |
CN101588242A (en) | Method and system for realizing authority management | |
CN102339367A (en) | Method and device for controlling permission | |
CN101621518A (en) | Method for managing permission | |
CN103500298A (en) | Method for achieving authorization distribution based on rule management | |
CN109191649B (en) | Method and device for sharing control authority of intelligent door lock | |
US20140227979A1 (en) | Automated Method for Coupling a Mobile Communication Terminal to a Central Computation Unit in a Motor Vehicle | |
CN101316182A (en) | Authorization number control method and equipment of user terminal | |
CN112466013B (en) | Digital key management method, device, system and storage medium | |
CN113570758A (en) | Remote monitoring terminal and vehicle Bluetooth key management method | |
CN106127888A (en) | Smart lock operational approach and smart lock operating system | |
CN109543365A (en) | A kind of authorization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110406 |