CN103780604A - Ubiquitous resource user access control method for multiple roles - Google Patents
Ubiquitous resource user access control method for multiple roles Download PDFInfo
- Publication number
- CN103780604A CN103780604A CN201410003952.9A CN201410003952A CN103780604A CN 103780604 A CN103780604 A CN 103780604A CN 201410003952 A CN201410003952 A CN 201410003952A CN 103780604 A CN103780604 A CN 103780604A
- Authority
- CN
- China
- Prior art keywords
- user
- role
- resource
- authority
- ubiquitous
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a ubiquitous resource user access control method for multiple roles. The method is characterized in that when a user carries out the operations of resource adding, resource application and resource using on a ubiquitous network open platform, the ubiquitous network open platform successively determines the user sending an operation request, user roles, a user permission bound with each role and traffic restriction bound with each permission of the corresponding role according to the order of the three layer architecture of user-role-permission; according to the user permission bound with each role and the traffic restriction bound with each permission of the corresponding role, the step of controlling resource access of the user is carried out; each user has a number of roles, and each role has a number of permissions; and each permission bound with each user role has a traffic restriction property. The method can well adapt to the application scene of multiple user roles and traffic control in a ubiquitous network, and has the characteristics of high efficiency and scalability.
Description
Technical field
The invention belongs to Ubiquitous Network technical field, be specifically related to a kind of ubiquitous resource user access control method towards polygonal look.
Background technology
OAuth is a kind of internet standard protocol for open mandate based on Web.[E.Hammer-Lahav, Ed. " RFC5849:The OAuth1.0Protocol. " Internet Engineering Task Force (2010)] OAuth agreement allows user to allow the resource of the secret that this user of third party's application access stores on a certain website (as photo, video, contacts list), and without username and password being offered to third party's application.OAuth agreement is used widely in numerous the Internets open platforms (as Sina, bean cotyledon etc.), but will face many challenges when this mechanism is applied to ubiquitous network.One, OAuth agreement can not adapt to the feature of the polygonal look of user in ubiquitous network platform.In the application scenarios of OAuth agreement, generally there will not be if user in ubiquitous network open platform is as the owner of part resource, simultaneously again as the user's of other resources situation.Its two, itself does not provide fee collecting system OAuth agreement, and in ubiquitous network, resource provisioning person need to prevent by flow control user's malice access.
For this reason, the invention provides a kind of ubiquitous resource user access control method towards polygonal look, solve the problem existing in existing protocol.
Summary of the invention
The object of the invention is to provide a kind of ubiquitous resource user access control method towards polygonal look, solved the problem such as requirement that existing protocol can not meet many role characteristics of user in ubiquitous network and realize flow control.
In order to solve these problems of the prior art, technical scheme provided by the invention is as follows:
A kind of ubiquitous resource user access control method towards polygonal look, it is characterized in that described method comprises that user adds resource to ubiquitous network open platform, application resource, while using resource operation, ubiquitous network open platform is determined the user of transmit operation request successively according to the order of user-role-authority three-tier architecture, user's role, the flow restriction of binding with the user right of each role bindings with the each authority of corresponding role, according to controlling the step of user access resources with the user right of each role bindings with the flow restriction of the each authority of corresponding role binding, wherein each user has several role, and every kind of role has several authority, there is flow restriction attribute with each authority of user role binding.
Preferred technical scheme is: in described method, ubiquitous network open platform is provided with subscriber's meter, role's table, authority list, user role table, role-security table and customer flow table; The information of described subscriber's meter comprises user's sequence number (UserID), user name (UserName), password (Password) and platform key (APIKey); The information of described role's table comprises role sequence number (RoleID) and role name (RoleName); The information of user role table comprises user's sequence number (UserID) and role's sequence number (RoleID); The information of role-security table comprises authority sequence number (PermissionID) and authority name (PermissionName); The information of customer flow table comprises user's sequence number (UserID), authority sequence number (PermissionID) and residue degree (RemainNum).
Preferred technical scheme is: in described method, in the time that user provides resource to ubiquitous network open platform, carry out according to following steps:
(1) to the authority of adding resource dependency in user right table;
(2), to the role who adds resource dependency in role table, comprise owner and the different brackets user of this resource;
(3) add role's sequence number, authority sequence number and the access times of resource dependency to role-security table;
(4) in user role table, add the owner that this user is resource.
(5) to the relative recording that adds the various authorities of user to resource in customer flow table, comprise residue access times.
Preferred technical scheme is: in described method, when user is during to ubiquitous network open platform application resource, carry out according to following steps:
(1) in user role table, add the corresponding user that this user is this resource;
(2) in role-security table, inquire about authority that this role has and the access times of associated rights;
(3) according to Query Result to the relative recording that adds the various authorities of this user to this resource in customer flow table, comprise residue access times.
Preferred technical scheme is: in described method, in the time that user uses resource, carry out according to following steps:
(1), when user uses resource to the request of ubiquitous network open platform, in request data package, add the APIKey of access customer, for ubiquitous network open platform authentication;
(2) ubiquitous network open platform is searched respective user ID according to the APIKey receiving in subscriber's meter;
(3) search the residue access times of corresponding authority at customer flow table according to the user ID finding, if this value is greater than 0, carry out the operation of this API, and residue access times are subtracted to 1, otherwise return to error message.
Preferred technical scheme is: described method also comprises that ubiquitous network open platform carries out flow refresh operation executing after the flow refresh cycle, carries out in accordance with the following steps:
(1) for each user in subscriber's meter (users), its all roles of inquiry in user role table (userroles);
(2) in role-security table (rolepermissions), inquire about its all authorities and access times for the each role who inquires, obtain all authorities of this user;
(3) in customer flow table (userflow), find successively corresponding user's sequence number (UserID) and authority sequence number (PermissionID), and upgrade residual flow according to the access times that inquire.
The main thought of technical solution of the present invention access control mechanisms is to adopt user-role-authority three-tier architecture, can realize the corresponding multiple roles of unique user, have numerous different rights, and the flow control mechanism using can be realized different flow restriction to the user of different brackets.
In ubiquitous network open platform customer data base, comprise altogether six tables, be respectively subscriber's meter, role's table, user role table, authority list, role-security table and customer flow table.
Wherein subscriber's meter: each user's information comprises user's sequence number, user name, password and platform key; Role's table: have diversified role in ubiquitous network open platform, Role Information mainly comprises role's sequence number and role name; User role table: each user can have multiple role attributes, under user, Role Information comprises user's sequence number and role's sequence number; Authority list: have diversified authority in ubiquitous network open platform, authority information comprises authority sequence number and authority name; Role-security table: each role can have multiple authority, role-security information comprises role sequence number, authority sequence number and access times; Customer flow table: each user has corresponding flow restriction to the various authorities of use, and user's flow information comprises user's sequence number, authority sequence number and residue degree.By the dependence between each database list item, the authority of user's different role is carried out to unified management, and realize customer flow control.
Concrete user access control method comprises following various aspects:
1. user's registration
User is as follows in the handling process of ubiquitous network open platform registration:
(1) user inputs user name (UserName) and the password (Password) that oneself is registered;
(2) ubiquitous network open platform adds interpolation user profile in subscriber's meter (users) to after detecting input legitimacy;
(3) ubiquitous network open platform is independently 20 APIKey of one of this user assignment.
2. resource is provided
User A provides the handling process of resource B as follows to ubiquitous network open platform:
(1) in authority list (permissions), add the relevant authority name (Name) of resource B, specifically comprise the write permission of resource B and the read right of resource B;
(2) in role's table (roles), add the relevant role name (Name) of resource B, specifically comprise the owner of resource B and the different brackets user of resource B;
(3) to middle relevant role's sequence number (RoleID), authority sequence number (PermissionID) and the access times (Number) that add resource B of role-security table (rolepermissions);
(4) be the owner of resource B to the middle interpolation of user role table (userroles) user A.
(5) to the middle relative recording that adds the various authorities of user A to resource B of customer flow table (userflow), specifically comprise residue access times (RemainNum) etc.
3. application resource
User C is as follows to the handling process of ubiquitous network open platform application resource B:
(1) to the user of to add user C in user role table (userroles) be resource B application grade;
(2) authority that this role of inquiry has in role-security table (rolepermissions) and the access times of associated rights;
(3) according to Query Result to the relative recording that adds the various authorities of a user C to resource B in customer flow table (userflow), specifically comprise residue access times (RemainNum) etc.
4. use resource
The handling process of the API of user C use resource B is as follows:
(1) in the request of used API headers, add the APIKey of access customer C, for ubiquitous network platform authentication;
(2) ubiquitous network open platform is searched respective user ID according to the APIKey receiving in subscriber's meter (users);
(3) search the residue access times (RemainNum) of corresponding authority at customer flow table (userflow) according to the user ID finding, if this value is greater than 0, carry out the operation of this API, and residue access times are subtracted to 1, otherwise return to error message.
5. flow refreshes
Each flow refresh cycle (generally take one day or January as the cycle), the refresh flow of customer flow table (userflow) is as follows:
(1) for each user in subscriber's meter (users), its all roles of inquiry in user role table (userroles);
(2) in role-security table (rolepermissions), inquire about its all authorities and access times for the each role who inquires in (1), to obtain all authorities of this user;
(3) in customer flow table (userflow), find successively corresponding user's sequence number (UserID) and authority sequence number (PermissionID), and upgrade residual flow according to the access times that inquire in (2).
Technical solution of the present invention provides a kind of new ubiquitous resource user access control method towards polygonal look.The database design of this ubiquitous network open platform comprises subscriber's meter, role's table, authority list, user role table, role-security table and customer flow table six table, for storing the ubiquitous resource access control law of user-role-authority three-tier architecture.By the dependence between each database list item, the authority of user's different role is carried out to unified management, and realize customer flow control.When user provides resource, application resource or uses when resource to ubiquitous network platform, need to add the corresponding table of database, the operation such as renewal, inquiry, to realize user to the resource access control in ubiquitous network.The inventive method comprises design and the ubiquitous resource access controlling mechanism of many character information database.The method of describing in the present invention can be good at adapting to the scene of the polygonal look of user and flow control in ubiquitous network, has high efficiency, extendible feature.
With respect to scheme of the prior art, advantage of the present invention is:
1. in the present invention, access control mechanisms adopts user-role-authority three-tier architecture, can realize the corresponding multiple roles of unique user, has numerous different rights.
2. the flow control mechanism using in the present invention can be realized different flow restriction to the user of different brackets, in actual ubiquitous network open platform, has higher practicality.
3. the database dependence that the present invention adopts is reasonable, has higher efficiency in actual motion, and convenient expansion.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described:
Fig. 1 is many character information database EER figure of ubiquitous network open platform during towards the ubiquitous resource user access control of polygonal look;
Fig. 2 is the schematic diagram towards the ubiquitous resource user access control method of polygonal look.
Embodiment
Below in conjunction with specific embodiment, such scheme is described further.Should be understood that these embodiment are not limited to limit the scope of the invention for the present invention is described.The implementation condition adopting in embodiment can be done further adjustment according to the condition of concrete producer, and not marked implementation condition is generally the condition in normal experiment.
Embodiment
As shown in Figure 2, the present embodiment is specifically described the ubiquitous resource user access control method towards polygonal look by user-role-authority three-tier architecture, comprise that user adds resource to ubiquitous network open platform, application resource, while using resource operation, ubiquitous network open platform is determined the user of transmit operation request successively according to the order of user-role-authority three-tier architecture, user's role, the flow restriction of binding with the user right of each role bindings with the each authority of corresponding role, according to controlling user access resources with the user right of each role bindings with the flow restriction of the each authority binding of corresponding role.
One, database design
As shown in Figure 1, when user is in the time that ubiquitous network open platform is registered, corresponding each user, ubiquitous network open platform can distribute for it platform key of one 30.Each user's information comprises user's sequence number (ID), user name (UserName), password (Password) and platform key (APIKey), and these information are stored in subscriber's meter as shown in table 1.
Table 1 subscriber's meter (users)
In ubiquitous network open platform, there is diversified role, such as resource user of resource owner and different brackets etc.Role Information mainly comprises role's sequence number (ID) and role name (Name), and these information are stored in role's table as shown in table 2.
Table 2 role shows (roles)
In ubiquitous network open platform, each user can have multiple role attributes.User A can be both the owner of B resource, can be again the user of C resource.Under user, Role Information comprises user's sequence number (UserID) and role's sequence number (RoleID), and these information are stored in user role table as shown in table 3, and a user can corresponding many records.
Table 3 user role table (userroles)
In ubiquitous network open platform, there is diversified authority, such as the write permission of resource and the read right of different brackets etc.Authority information comprises authority sequence number (ID) and authority name (Name), and these information are stored in authority list as shown in table 4.
Table 4 authority list (permissions)
In ubiquitous network open platform, each role can have multiple authority.Role A both can have the write permission of resource B, also can have the read right of resource B.Role-security information comprises role sequence number (RoleID), authority sequence number (PermissionID) and access times (Number), and these information are stored in role-security table as shown in table 5.
Table 5 role-security table (userpermissions)
Each user has corresponding flow restriction to the various authorities of use, for preventing user's malice access.User's flow information comprises user's sequence number (UserID), authority sequence number (PermissionID) and residue degree (RemainNum), and these information are stored in customer flow table as shown in table 6.
Table 6 customer flow table (userflow)
In the database of this polygonal look information access control method, the dependence of each tables of data as shown in Figure 1.
Two, user adds resource to ubiquitous network open platform
User1(ID=1) as follows to the handling process of ubiquitous network open platform interpolation resource dev:
(1) to adding two records (Name=devwrite) and (Name=devread) in authority list (permissions), represent respectively write permission (ID=1) and the read right (ID=2) of dev;
(2) to adding two records (Name=devowner) and (Name=devuser) in role table (roles), represent respectively owner (ID=1) and the user (ID=2) of dev;
(3) in role-security table (rolepermissions), add three record { RoleID=1, PermissionID=1, Number=1000000}, { RoleID=1, PermissionID=2, Number=1000000} and { RoleID=2, PermissionID=2, Number=100000}, represents that respectively the owner of dev has read right and the write permission of 1000000 times, and the user of dev has the rights of using of 100000 times;
(4) to a record of the middle interpolation of user role table (userroles), { UserID=1, RoleID=1} is to represent the owner of user user1 as resource dev.
(5) in customer flow table (userflow), add two record { UserID=1, PermissionID=1, RemainNum=1000000} and { UserID=1, PermissionID=2, RemainNum=1000000}, represents the residue access times of user user1 for the various authorities of resource dev.
Three, user applies for resources use right
User2(ID=2) as follows to the usufructuary handling process of ubiquitous network open platform application resource dev:
(1) to add in user role table (userroles) record UserID=2, RoleID=2} is to represent the user of user user2 as resource dev;
(2) authority that this role of inquiry has in role-security table (rolepermissions) and the access times of associated rights;
(3) according to Query Result, to record of the middle interpolation of customer flow table (userflow), { RemainNum=100000}, represents the residue access times of user user2 for the various authorities of resource dev for UserID=2, PermissionID=2.
Four, user uses resource
User2(ID=2) use the handling process of resource dev as follows:
(1) in the request of used API headers, add the APIKey of access customer C, for ubiquitous network open platform authentication;
(2) ubiquitous network open platform is searched respective user ID according to the APIKey receiving in subscriber's meter (users);
(3) search the residue access times (RemainNum) of corresponding authority at customer flow table (userflow) according to the user ID finding, this value is greater than 0, carries out the operation of this API, and residue access times are subtracted to 1.
After above process is complete, recording of respectively showing in database is as follows:
(1) users record
In sum, the resource access control method of describing in the present invention has good adaptability to multiclass communication requirement in ubiquitous network, comprises communication in net, TOCOM total communication etc.; There is low-power consumption, the advantage that autgmentability is good.Application prospect of the present invention is boundless.
Above-mentioned example is only explanation technical conceive of the present invention and feature, and its object is to allow person skilled in the art can understand content of the present invention and implement according to this, can not limit the scope of the invention with this.All equivalent transformations that Spirit Essence does according to the present invention or modification, within all should being encompassed in protection scope of the present invention.
Claims (6)
1. the ubiquitous resource user access control method towards polygonal look, it is characterized in that described method comprises that user adds resource to ubiquitous network open platform, application resource, while using resource operation, ubiquitous network open platform is determined the user of transmit operation request successively according to the order of user-role-authority three-tier architecture, user's role, the flow restriction of binding with the user right of each role bindings with the each authority of corresponding role, according to controlling the step of user access resources with the user right of each role bindings with the flow restriction of the each authority of corresponding role binding, wherein each user has several role, and every kind of role has several authority, there is flow restriction attribute with each authority of user role binding.
2. ubiquitous resource user access control method according to claim 1, is characterized in that in described method, ubiquitous network open platform is provided with subscriber's meter, role's table, authority list, user role table, role-security table and customer flow table; The information of described subscriber's meter comprises user's sequence number (UserID), user name (UserName), password (Password) and platform key (APIKey); The information of described role's table comprises role sequence number (RoleID) and role name (RoleName); The information of user role table comprises user's sequence number (UserID) and role's sequence number (RoleID); The information of role-security table comprises authority sequence number (PermissionID) and authority name (PermissionName); The information of customer flow table comprises user's sequence number (UserID), authority sequence number (PermissionID) and residue degree (RemainNum).
3. ubiquitous resource user access control method according to claim 1, is characterized in that in described method, in the time that user provides resource to ubiquitous network open platform, carrying out according to following steps:
(1) to the authority of adding resource dependency in user right table;
(2), to the role who adds resource dependency in role table, comprise owner and the different brackets user of this resource;
(3) add role's sequence number, authority sequence number and the access times of resource dependency to role-security table;
(4) in user role table, add the owner that this user is resource.
(5) to the relative recording that adds the various authorities of user to resource in customer flow table, comprise residue access times.
4. ubiquitous resource user access control method according to claim 1, is characterized in that in described method, when user is during to ubiquitous network open platform application resource, carrying out according to following steps:
(1) in user role table, add the corresponding user that this user is this resource;
(2) in role-security table, inquire about authority that this role has and the access times of associated rights;
(3) according to Query Result to the relative recording that adds the various authorities of this user to this resource in customer flow table, comprise residue access times.
5. ubiquitous resource user access control method according to claim 1, is characterized in that in described method, in the time that user uses resource, carrying out according to following steps:
(1), when user uses resource to the request of ubiquitous network open platform, in request data package, add the APIKey of access customer, for ubiquitous network open platform authentication;
(2) ubiquitous network open platform is searched respective user ID according to the APIKey receiving in subscriber's meter;
(3) search the residue access times of corresponding authority at customer flow table according to the user ID finding, if this value is greater than 0, carry out the operation of this API, and residue access times are subtracted to 1, otherwise return to error message.
6. ubiquitous resource user access control method according to claim 1, is characterized in that described method also comprises that ubiquitous network open platform carries out flow refresh operation executing after the flow refresh cycle, carries out in accordance with the following steps:
(1) for each user in subscriber's meter (users), its all roles of inquiry in user role table (userroles);
(2) in role-security table (rolepermissions), inquire about its all authorities and access times for the each role who inquires, obtain all authorities of this user;
(3) in customer flow table (userflow), find successively corresponding user's sequence number (UserID) and authority sequence number (PermissionID), and upgrade residual flow according to the access times that inquire.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410003952.9A CN103780604A (en) | 2014-01-06 | 2014-01-06 | Ubiquitous resource user access control method for multiple roles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410003952.9A CN103780604A (en) | 2014-01-06 | 2014-01-06 | Ubiquitous resource user access control method for multiple roles |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103780604A true CN103780604A (en) | 2014-05-07 |
Family
ID=50572434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410003952.9A Pending CN103780604A (en) | 2014-01-06 | 2014-01-06 | Ubiquitous resource user access control method for multiple roles |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103780604A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488383A (en) * | 2014-09-17 | 2016-04-13 | 北大方正集团有限公司 | Permission management method and system |
CN105574372A (en) * | 2015-09-28 | 2016-05-11 | 上海赞越软件服务中心 | Loose-leaf switching mechanism of permission roles |
CN105631266A (en) * | 2015-12-28 | 2016-06-01 | 上海赞越软件服务中心 | Mechanism for achieving multi-user switching through jQuery shell |
CN106529219A (en) * | 2016-11-08 | 2017-03-22 | 上海有云信息技术有限公司 | User authority control method and device |
CN113468214A (en) * | 2020-03-30 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Database access control method and device, electronic equipment and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005091161A1 (en) * | 2004-03-22 | 2005-09-29 | Nitgen Technologies Inc. | A streaming based contents distribution network system and methods for splitting, merging and retrieving files |
CN101552781A (en) * | 2009-05-07 | 2009-10-07 | 用友软件股份有限公司 | A method for online access to SAAS service |
-
2014
- 2014-01-06 CN CN201410003952.9A patent/CN103780604A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005091161A1 (en) * | 2004-03-22 | 2005-09-29 | Nitgen Technologies Inc. | A streaming based contents distribution network system and methods for splitting, merging and retrieving files |
CN101552781A (en) * | 2009-05-07 | 2009-10-07 | 用友软件股份有限公司 | A method for online access to SAAS service |
Non-Patent Citations (4)
Title |
---|
吴洁明,王吉栋: "《基于角色的访问控制在Struts2中的应用》", 《计算机安全》 * |
张兴,王华,施俊士: "《Web信息系统中基于树形结构的RBAC模型设计与实现》", 《计算机应用与软件》 * |
甘剑: "《基于角色的访问机制的研究及应用》", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
邹晓: "《一种使用受限的角色委托模型》", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488383A (en) * | 2014-09-17 | 2016-04-13 | 北大方正集团有限公司 | Permission management method and system |
CN105574372A (en) * | 2015-09-28 | 2016-05-11 | 上海赞越软件服务中心 | Loose-leaf switching mechanism of permission roles |
CN105631266A (en) * | 2015-12-28 | 2016-06-01 | 上海赞越软件服务中心 | Mechanism for achieving multi-user switching through jQuery shell |
CN106529219A (en) * | 2016-11-08 | 2017-03-22 | 上海有云信息技术有限公司 | User authority control method and device |
CN106529219B (en) * | 2016-11-08 | 2019-04-09 | 上海有云信息技术有限公司 | The control method and device of user right |
CN113468214A (en) * | 2020-03-30 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Database access control method and device, electronic equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9047462B2 (en) | Computer account management system and realizing method thereof | |
Cao et al. | A survey of identity management technology | |
US10461939B2 (en) | Secure device registration for multi-factor authentication | |
US20190370358A1 (en) | Securing access to confidential data using a blockchain ledger | |
CN108880794A (en) | Across chain user identity and its digital asset management system | |
CN103780604A (en) | Ubiquitous resource user access control method for multiple roles | |
CN105871914B (en) | CRM system access control method | |
CN103023933B (en) | A kind of log-on message Integrated Processing System and method | |
MX2022010227A (en) | Authentication server function selection in authentication and key management. | |
CN106572087B (en) | Voice outbound system | |
CN103065074A (en) | Uniform Resource Locator (URL) authority control method based on fine granularity | |
CN101452454A (en) | File set sharing method and device | |
EP1548614B1 (en) | Storage service | |
CN106789881A (en) | A kind of block chain digital identification authentication method and system based on domain name service DNS systems | |
CN101771723A (en) | Data synchronization method | |
CN103188249A (en) | Concentration permission management system, authorization method and authentication method thereof | |
CN102685122B (en) | The method of the software protection based on cloud server | |
CN102754386A (en) | Hierarchical key management for secure communications in multimedia communication system | |
Omar et al. | Decentralized identifiers and verifiable credentials for smartphone anticounterfeiting and decentralized IMEI database | |
KR102271201B1 (en) | Method for maintaining private information on blockchain network and device thereof | |
CN109951567A (en) | A kind of Double Data center applications dispositions method | |
CN101730085A (en) | Address book data synchronizing method and system | |
CN103107976A (en) | Content provider/service provider (CP/SP) user identification authentication method and system and authentication support device | |
Chauhan | Iot network identity management using smart contract and blockchain technology | |
US9232078B1 (en) | Method and system for data usage accounting across multiple communication networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140507 |