CN103780604A - Ubiquitous resource user access control method for multiple roles - Google Patents

Ubiquitous resource user access control method for multiple roles Download PDF

Info

Publication number
CN103780604A
CN103780604A CN201410003952.9A CN201410003952A CN103780604A CN 103780604 A CN103780604 A CN 103780604A CN 201410003952 A CN201410003952 A CN 201410003952A CN 103780604 A CN103780604 A CN 103780604A
Authority
CN
China
Prior art keywords
user
role
resource
authority
ubiquitous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410003952.9A
Other languages
Chinese (zh)
Inventor
黄刘生
杨晨凯
徐宏力
冷冰
许瑞阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Institute for Advanced Study USTC
Original Assignee
Suzhou Institute for Advanced Study USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Institute for Advanced Study USTC filed Critical Suzhou Institute for Advanced Study USTC
Priority to CN201410003952.9A priority Critical patent/CN103780604A/en
Publication of CN103780604A publication Critical patent/CN103780604A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a ubiquitous resource user access control method for multiple roles. The method is characterized in that when a user carries out the operations of resource adding, resource application and resource using on a ubiquitous network open platform, the ubiquitous network open platform successively determines the user sending an operation request, user roles, a user permission bound with each role and traffic restriction bound with each permission of the corresponding role according to the order of the three layer architecture of user-role-permission; according to the user permission bound with each role and the traffic restriction bound with each permission of the corresponding role, the step of controlling resource access of the user is carried out; each user has a number of roles, and each role has a number of permissions; and each permission bound with each user role has a traffic restriction property. The method can well adapt to the application scene of multiple user roles and traffic control in a ubiquitous network, and has the characteristics of high efficiency and scalability.

Description

Towards the ubiquitous resource user access control method of polygonal look
Technical field
The invention belongs to Ubiquitous Network technical field, be specifically related to a kind of ubiquitous resource user access control method towards polygonal look.
Background technology
OAuth is a kind of internet standard protocol for open mandate based on Web.[E.Hammer-Lahav, Ed. " RFC5849:The OAuth1.0Protocol. " Internet Engineering Task Force (2010)] OAuth agreement allows user to allow the resource of the secret that this user of third party's application access stores on a certain website (as photo, video, contacts list), and without username and password being offered to third party's application.OAuth agreement is used widely in numerous the Internets open platforms (as Sina, bean cotyledon etc.), but will face many challenges when this mechanism is applied to ubiquitous network.One, OAuth agreement can not adapt to the feature of the polygonal look of user in ubiquitous network platform.In the application scenarios of OAuth agreement, generally there will not be if user in ubiquitous network open platform is as the owner of part resource, simultaneously again as the user's of other resources situation.Its two, itself does not provide fee collecting system OAuth agreement, and in ubiquitous network, resource provisioning person need to prevent by flow control user's malice access.
For this reason, the invention provides a kind of ubiquitous resource user access control method towards polygonal look, solve the problem existing in existing protocol.
Summary of the invention
The object of the invention is to provide a kind of ubiquitous resource user access control method towards polygonal look, solved the problem such as requirement that existing protocol can not meet many role characteristics of user in ubiquitous network and realize flow control.
In order to solve these problems of the prior art, technical scheme provided by the invention is as follows:
A kind of ubiquitous resource user access control method towards polygonal look, it is characterized in that described method comprises that user adds resource to ubiquitous network open platform, application resource, while using resource operation, ubiquitous network open platform is determined the user of transmit operation request successively according to the order of user-role-authority three-tier architecture, user's role, the flow restriction of binding with the user right of each role bindings with the each authority of corresponding role, according to controlling the step of user access resources with the user right of each role bindings with the flow restriction of the each authority of corresponding role binding, wherein each user has several role, and every kind of role has several authority, there is flow restriction attribute with each authority of user role binding.
Preferred technical scheme is: in described method, ubiquitous network open platform is provided with subscriber's meter, role's table, authority list, user role table, role-security table and customer flow table; The information of described subscriber's meter comprises user's sequence number (UserID), user name (UserName), password (Password) and platform key (APIKey); The information of described role's table comprises role sequence number (RoleID) and role name (RoleName); The information of user role table comprises user's sequence number (UserID) and role's sequence number (RoleID); The information of role-security table comprises authority sequence number (PermissionID) and authority name (PermissionName); The information of customer flow table comprises user's sequence number (UserID), authority sequence number (PermissionID) and residue degree (RemainNum).
Preferred technical scheme is: in described method, in the time that user provides resource to ubiquitous network open platform, carry out according to following steps:
(1) to the authority of adding resource dependency in user right table;
(2), to the role who adds resource dependency in role table, comprise owner and the different brackets user of this resource;
(3) add role's sequence number, authority sequence number and the access times of resource dependency to role-security table;
(4) in user role table, add the owner that this user is resource.
(5) to the relative recording that adds the various authorities of user to resource in customer flow table, comprise residue access times.
Preferred technical scheme is: in described method, when user is during to ubiquitous network open platform application resource, carry out according to following steps:
(1) in user role table, add the corresponding user that this user is this resource;
(2) in role-security table, inquire about authority that this role has and the access times of associated rights;
(3) according to Query Result to the relative recording that adds the various authorities of this user to this resource in customer flow table, comprise residue access times.
Preferred technical scheme is: in described method, in the time that user uses resource, carry out according to following steps:
(1), when user uses resource to the request of ubiquitous network open platform, in request data package, add the APIKey of access customer, for ubiquitous network open platform authentication;
(2) ubiquitous network open platform is searched respective user ID according to the APIKey receiving in subscriber's meter;
(3) search the residue access times of corresponding authority at customer flow table according to the user ID finding, if this value is greater than 0, carry out the operation of this API, and residue access times are subtracted to 1, otherwise return to error message.
Preferred technical scheme is: described method also comprises that ubiquitous network open platform carries out flow refresh operation executing after the flow refresh cycle, carries out in accordance with the following steps:
(1) for each user in subscriber's meter (users), its all roles of inquiry in user role table (userroles);
(2) in role-security table (rolepermissions), inquire about its all authorities and access times for the each role who inquires, obtain all authorities of this user;
(3) in customer flow table (userflow), find successively corresponding user's sequence number (UserID) and authority sequence number (PermissionID), and upgrade residual flow according to the access times that inquire.
The main thought of technical solution of the present invention access control mechanisms is to adopt user-role-authority three-tier architecture, can realize the corresponding multiple roles of unique user, have numerous different rights, and the flow control mechanism using can be realized different flow restriction to the user of different brackets.
In ubiquitous network open platform customer data base, comprise altogether six tables, be respectively subscriber's meter, role's table, user role table, authority list, role-security table and customer flow table.
Wherein subscriber's meter: each user's information comprises user's sequence number, user name, password and platform key; Role's table: have diversified role in ubiquitous network open platform, Role Information mainly comprises role's sequence number and role name; User role table: each user can have multiple role attributes, under user, Role Information comprises user's sequence number and role's sequence number; Authority list: have diversified authority in ubiquitous network open platform, authority information comprises authority sequence number and authority name; Role-security table: each role can have multiple authority, role-security information comprises role sequence number, authority sequence number and access times; Customer flow table: each user has corresponding flow restriction to the various authorities of use, and user's flow information comprises user's sequence number, authority sequence number and residue degree.By the dependence between each database list item, the authority of user's different role is carried out to unified management, and realize customer flow control.
Concrete user access control method comprises following various aspects:
1. user's registration
User is as follows in the handling process of ubiquitous network open platform registration:
(1) user inputs user name (UserName) and the password (Password) that oneself is registered;
(2) ubiquitous network open platform adds interpolation user profile in subscriber's meter (users) to after detecting input legitimacy;
(3) ubiquitous network open platform is independently 20 APIKey of one of this user assignment.
2. resource is provided
User A provides the handling process of resource B as follows to ubiquitous network open platform:
(1) in authority list (permissions), add the relevant authority name (Name) of resource B, specifically comprise the write permission of resource B and the read right of resource B;
(2) in role's table (roles), add the relevant role name (Name) of resource B, specifically comprise the owner of resource B and the different brackets user of resource B;
(3) to middle relevant role's sequence number (RoleID), authority sequence number (PermissionID) and the access times (Number) that add resource B of role-security table (rolepermissions);
(4) be the owner of resource B to the middle interpolation of user role table (userroles) user A.
(5) to the middle relative recording that adds the various authorities of user A to resource B of customer flow table (userflow), specifically comprise residue access times (RemainNum) etc.
3. application resource
User C is as follows to the handling process of ubiquitous network open platform application resource B:
(1) to the user of to add user C in user role table (userroles) be resource B application grade;
(2) authority that this role of inquiry has in role-security table (rolepermissions) and the access times of associated rights;
(3) according to Query Result to the relative recording that adds the various authorities of a user C to resource B in customer flow table (userflow), specifically comprise residue access times (RemainNum) etc.
4. use resource
The handling process of the API of user C use resource B is as follows:
(1) in the request of used API headers, add the APIKey of access customer C, for ubiquitous network platform authentication;
(2) ubiquitous network open platform is searched respective user ID according to the APIKey receiving in subscriber's meter (users);
(3) search the residue access times (RemainNum) of corresponding authority at customer flow table (userflow) according to the user ID finding, if this value is greater than 0, carry out the operation of this API, and residue access times are subtracted to 1, otherwise return to error message.
5. flow refreshes
Each flow refresh cycle (generally take one day or January as the cycle), the refresh flow of customer flow table (userflow) is as follows:
(1) for each user in subscriber's meter (users), its all roles of inquiry in user role table (userroles);
(2) in role-security table (rolepermissions), inquire about its all authorities and access times for the each role who inquires in (1), to obtain all authorities of this user;
(3) in customer flow table (userflow), find successively corresponding user's sequence number (UserID) and authority sequence number (PermissionID), and upgrade residual flow according to the access times that inquire in (2).
Technical solution of the present invention provides a kind of new ubiquitous resource user access control method towards polygonal look.The database design of this ubiquitous network open platform comprises subscriber's meter, role's table, authority list, user role table, role-security table and customer flow table six table, for storing the ubiquitous resource access control law of user-role-authority three-tier architecture.By the dependence between each database list item, the authority of user's different role is carried out to unified management, and realize customer flow control.When user provides resource, application resource or uses when resource to ubiquitous network platform, need to add the corresponding table of database, the operation such as renewal, inquiry, to realize user to the resource access control in ubiquitous network.The inventive method comprises design and the ubiquitous resource access controlling mechanism of many character information database.The method of describing in the present invention can be good at adapting to the scene of the polygonal look of user and flow control in ubiquitous network, has high efficiency, extendible feature.
With respect to scheme of the prior art, advantage of the present invention is:
1. in the present invention, access control mechanisms adopts user-role-authority three-tier architecture, can realize the corresponding multiple roles of unique user, has numerous different rights.
2. the flow control mechanism using in the present invention can be realized different flow restriction to the user of different brackets, in actual ubiquitous network open platform, has higher practicality.
3. the database dependence that the present invention adopts is reasonable, has higher efficiency in actual motion, and convenient expansion.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described:
Fig. 1 is many character information database EER figure of ubiquitous network open platform during towards the ubiquitous resource user access control of polygonal look;
Fig. 2 is the schematic diagram towards the ubiquitous resource user access control method of polygonal look.
Embodiment
Below in conjunction with specific embodiment, such scheme is described further.Should be understood that these embodiment are not limited to limit the scope of the invention for the present invention is described.The implementation condition adopting in embodiment can be done further adjustment according to the condition of concrete producer, and not marked implementation condition is generally the condition in normal experiment.
Embodiment
As shown in Figure 2, the present embodiment is specifically described the ubiquitous resource user access control method towards polygonal look by user-role-authority three-tier architecture, comprise that user adds resource to ubiquitous network open platform, application resource, while using resource operation, ubiquitous network open platform is determined the user of transmit operation request successively according to the order of user-role-authority three-tier architecture, user's role, the flow restriction of binding with the user right of each role bindings with the each authority of corresponding role, according to controlling user access resources with the user right of each role bindings with the flow restriction of the each authority binding of corresponding role.
One, database design
As shown in Figure 1, when user is in the time that ubiquitous network open platform is registered, corresponding each user, ubiquitous network open platform can distribute for it platform key of one 30.Each user's information comprises user's sequence number (ID), user name (UserName), password (Password) and platform key (APIKey), and these information are stored in subscriber's meter as shown in table 1.
Figure BDA0000453347740000061
Table 1 subscriber's meter (users)
In ubiquitous network open platform, there is diversified role, such as resource user of resource owner and different brackets etc.Role Information mainly comprises role's sequence number (ID) and role name (Name), and these information are stored in role's table as shown in table 2.
Figure BDA0000453347740000071
Table 2 role shows (roles)
In ubiquitous network open platform, each user can have multiple role attributes.User A can be both the owner of B resource, can be again the user of C resource.Under user, Role Information comprises user's sequence number (UserID) and role's sequence number (RoleID), and these information are stored in user role table as shown in table 3, and a user can corresponding many records.
Figure BDA0000453347740000072
Table 3 user role table (userroles)
In ubiquitous network open platform, there is diversified authority, such as the write permission of resource and the read right of different brackets etc.Authority information comprises authority sequence number (ID) and authority name (Name), and these information are stored in authority list as shown in table 4.
Figure BDA0000453347740000073
Table 4 authority list (permissions)
In ubiquitous network open platform, each role can have multiple authority.Role A both can have the write permission of resource B, also can have the read right of resource B.Role-security information comprises role sequence number (RoleID), authority sequence number (PermissionID) and access times (Number), and these information are stored in role-security table as shown in table 5.
Figure BDA0000453347740000074
Table 5 role-security table (userpermissions)
Each user has corresponding flow restriction to the various authorities of use, for preventing user's malice access.User's flow information comprises user's sequence number (UserID), authority sequence number (PermissionID) and residue degree (RemainNum), and these information are stored in customer flow table as shown in table 6.
Figure BDA0000453347740000081
Table 6 customer flow table (userflow)
In the database of this polygonal look information access control method, the dependence of each tables of data as shown in Figure 1.
Two, user adds resource to ubiquitous network open platform
User1(ID=1) as follows to the handling process of ubiquitous network open platform interpolation resource dev:
(1) to adding two records (Name=devwrite) and (Name=devread) in authority list (permissions), represent respectively write permission (ID=1) and the read right (ID=2) of dev;
(2) to adding two records (Name=devowner) and (Name=devuser) in role table (roles), represent respectively owner (ID=1) and the user (ID=2) of dev;
(3) in role-security table (rolepermissions), add three record { RoleID=1, PermissionID=1, Number=1000000}, { RoleID=1, PermissionID=2, Number=1000000} and { RoleID=2, PermissionID=2, Number=100000}, represents that respectively the owner of dev has read right and the write permission of 1000000 times, and the user of dev has the rights of using of 100000 times;
(4) to a record of the middle interpolation of user role table (userroles), { UserID=1, RoleID=1} is to represent the owner of user user1 as resource dev.
(5) in customer flow table (userflow), add two record { UserID=1, PermissionID=1, RemainNum=1000000} and { UserID=1, PermissionID=2, RemainNum=1000000}, represents the residue access times of user user1 for the various authorities of resource dev.
Three, user applies for resources use right
User2(ID=2) as follows to the usufructuary handling process of ubiquitous network open platform application resource dev:
(1) to add in user role table (userroles) record UserID=2, RoleID=2} is to represent the user of user user2 as resource dev;
(2) authority that this role of inquiry has in role-security table (rolepermissions) and the access times of associated rights;
(3) according to Query Result, to record of the middle interpolation of customer flow table (userflow), { RemainNum=100000}, represents the residue access times of user user2 for the various authorities of resource dev for UserID=2, PermissionID=2.
Four, user uses resource
User2(ID=2) use the handling process of resource dev as follows:
(1) in the request of used API headers, add the APIKey of access customer C, for ubiquitous network open platform authentication;
(2) ubiquitous network open platform is searched respective user ID according to the APIKey receiving in subscriber's meter (users);
(3) search the residue access times (RemainNum) of corresponding authority at customer flow table (userflow) according to the user ID finding, this value is greater than 0, carries out the operation of this API, and residue access times are subtracted to 1.
After above process is complete, recording of respectively showing in database is as follows:
(1) users record
Figure BDA0000453347740000091
Figure BDA0000453347740000101
In sum, the resource access control method of describing in the present invention has good adaptability to multiclass communication requirement in ubiquitous network, comprises communication in net, TOCOM total communication etc.; There is low-power consumption, the advantage that autgmentability is good.Application prospect of the present invention is boundless.
Above-mentioned example is only explanation technical conceive of the present invention and feature, and its object is to allow person skilled in the art can understand content of the present invention and implement according to this, can not limit the scope of the invention with this.All equivalent transformations that Spirit Essence does according to the present invention or modification, within all should being encompassed in protection scope of the present invention.

Claims (6)

1. the ubiquitous resource user access control method towards polygonal look, it is characterized in that described method comprises that user adds resource to ubiquitous network open platform, application resource, while using resource operation, ubiquitous network open platform is determined the user of transmit operation request successively according to the order of user-role-authority three-tier architecture, user's role, the flow restriction of binding with the user right of each role bindings with the each authority of corresponding role, according to controlling the step of user access resources with the user right of each role bindings with the flow restriction of the each authority of corresponding role binding, wherein each user has several role, and every kind of role has several authority, there is flow restriction attribute with each authority of user role binding.
2. ubiquitous resource user access control method according to claim 1, is characterized in that in described method, ubiquitous network open platform is provided with subscriber's meter, role's table, authority list, user role table, role-security table and customer flow table; The information of described subscriber's meter comprises user's sequence number (UserID), user name (UserName), password (Password) and platform key (APIKey); The information of described role's table comprises role sequence number (RoleID) and role name (RoleName); The information of user role table comprises user's sequence number (UserID) and role's sequence number (RoleID); The information of role-security table comprises authority sequence number (PermissionID) and authority name (PermissionName); The information of customer flow table comprises user's sequence number (UserID), authority sequence number (PermissionID) and residue degree (RemainNum).
3. ubiquitous resource user access control method according to claim 1, is characterized in that in described method, in the time that user provides resource to ubiquitous network open platform, carrying out according to following steps:
(1) to the authority of adding resource dependency in user right table;
(2), to the role who adds resource dependency in role table, comprise owner and the different brackets user of this resource;
(3) add role's sequence number, authority sequence number and the access times of resource dependency to role-security table;
(4) in user role table, add the owner that this user is resource.
(5) to the relative recording that adds the various authorities of user to resource in customer flow table, comprise residue access times.
4. ubiquitous resource user access control method according to claim 1, is characterized in that in described method, when user is during to ubiquitous network open platform application resource, carrying out according to following steps:
(1) in user role table, add the corresponding user that this user is this resource;
(2) in role-security table, inquire about authority that this role has and the access times of associated rights;
(3) according to Query Result to the relative recording that adds the various authorities of this user to this resource in customer flow table, comprise residue access times.
5. ubiquitous resource user access control method according to claim 1, is characterized in that in described method, in the time that user uses resource, carrying out according to following steps:
(1), when user uses resource to the request of ubiquitous network open platform, in request data package, add the APIKey of access customer, for ubiquitous network open platform authentication;
(2) ubiquitous network open platform is searched respective user ID according to the APIKey receiving in subscriber's meter;
(3) search the residue access times of corresponding authority at customer flow table according to the user ID finding, if this value is greater than 0, carry out the operation of this API, and residue access times are subtracted to 1, otherwise return to error message.
6. ubiquitous resource user access control method according to claim 1, is characterized in that described method also comprises that ubiquitous network open platform carries out flow refresh operation executing after the flow refresh cycle, carries out in accordance with the following steps:
(1) for each user in subscriber's meter (users), its all roles of inquiry in user role table (userroles);
(2) in role-security table (rolepermissions), inquire about its all authorities and access times for the each role who inquires, obtain all authorities of this user;
(3) in customer flow table (userflow), find successively corresponding user's sequence number (UserID) and authority sequence number (PermissionID), and upgrade residual flow according to the access times that inquire.
CN201410003952.9A 2014-01-06 2014-01-06 Ubiquitous resource user access control method for multiple roles Pending CN103780604A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410003952.9A CN103780604A (en) 2014-01-06 2014-01-06 Ubiquitous resource user access control method for multiple roles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410003952.9A CN103780604A (en) 2014-01-06 2014-01-06 Ubiquitous resource user access control method for multiple roles

Publications (1)

Publication Number Publication Date
CN103780604A true CN103780604A (en) 2014-05-07

Family

ID=50572434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410003952.9A Pending CN103780604A (en) 2014-01-06 2014-01-06 Ubiquitous resource user access control method for multiple roles

Country Status (1)

Country Link
CN (1) CN103780604A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488383A (en) * 2014-09-17 2016-04-13 北大方正集团有限公司 Permission management method and system
CN105574372A (en) * 2015-09-28 2016-05-11 上海赞越软件服务中心 Loose-leaf switching mechanism of permission roles
CN105631266A (en) * 2015-12-28 2016-06-01 上海赞越软件服务中心 Mechanism for achieving multi-user switching through jQuery shell
CN106529219A (en) * 2016-11-08 2017-03-22 上海有云信息技术有限公司 User authority control method and device
CN113468214A (en) * 2020-03-30 2021-10-01 阿里巴巴集团控股有限公司 Database access control method and device, electronic equipment and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005091161A1 (en) * 2004-03-22 2005-09-29 Nitgen Technologies Inc. A streaming based contents distribution network system and methods for splitting, merging and retrieving files
CN101552781A (en) * 2009-05-07 2009-10-07 用友软件股份有限公司 A method for online access to SAAS service

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005091161A1 (en) * 2004-03-22 2005-09-29 Nitgen Technologies Inc. A streaming based contents distribution network system and methods for splitting, merging and retrieving files
CN101552781A (en) * 2009-05-07 2009-10-07 用友软件股份有限公司 A method for online access to SAAS service

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
吴洁明,王吉栋: "《基于角色的访问控制在Struts2中的应用》", 《计算机安全》 *
张兴,王华,施俊士: "《Web信息系统中基于树形结构的RBAC模型设计与实现》", 《计算机应用与软件》 *
甘剑: "《基于角色的访问机制的研究及应用》", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
邹晓: "《一种使用受限的角色委托模型》", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488383A (en) * 2014-09-17 2016-04-13 北大方正集团有限公司 Permission management method and system
CN105574372A (en) * 2015-09-28 2016-05-11 上海赞越软件服务中心 Loose-leaf switching mechanism of permission roles
CN105631266A (en) * 2015-12-28 2016-06-01 上海赞越软件服务中心 Mechanism for achieving multi-user switching through jQuery shell
CN106529219A (en) * 2016-11-08 2017-03-22 上海有云信息技术有限公司 User authority control method and device
CN106529219B (en) * 2016-11-08 2019-04-09 上海有云信息技术有限公司 The control method and device of user right
CN113468214A (en) * 2020-03-30 2021-10-01 阿里巴巴集团控股有限公司 Database access control method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US9047462B2 (en) Computer account management system and realizing method thereof
Cao et al. A survey of identity management technology
US10461939B2 (en) Secure device registration for multi-factor authentication
US20190370358A1 (en) Securing access to confidential data using a blockchain ledger
CN108880794A (en) Across chain user identity and its digital asset management system
CN103780604A (en) Ubiquitous resource user access control method for multiple roles
CN105871914B (en) CRM system access control method
CN103023933B (en) A kind of log-on message Integrated Processing System and method
MX2022010227A (en) Authentication server function selection in authentication and key management.
CN106572087B (en) Voice outbound system
CN103065074A (en) Uniform Resource Locator (URL) authority control method based on fine granularity
CN101452454A (en) File set sharing method and device
EP1548614B1 (en) Storage service
CN106789881A (en) A kind of block chain digital identification authentication method and system based on domain name service DNS systems
CN101771723A (en) Data synchronization method
CN103188249A (en) Concentration permission management system, authorization method and authentication method thereof
CN102685122B (en) The method of the software protection based on cloud server
CN102754386A (en) Hierarchical key management for secure communications in multimedia communication system
Omar et al. Decentralized identifiers and verifiable credentials for smartphone anticounterfeiting and decentralized IMEI database
KR102271201B1 (en) Method for maintaining private information on blockchain network and device thereof
CN109951567A (en) A kind of Double Data center applications dispositions method
CN101730085A (en) Address book data synchronizing method and system
CN103107976A (en) Content provider/service provider (CP/SP) user identification authentication method and system and authentication support device
Chauhan Iot network identity management using smart contract and blockchain technology
US9232078B1 (en) Method and system for data usage accounting across multiple communication networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140507