CN107257337A - A kind of shared authority control method of multiterminal and its system - Google Patents
A kind of shared authority control method of multiterminal and its system Download PDFInfo
- Publication number
- CN107257337A CN107257337A CN201710452694.6A CN201710452694A CN107257337A CN 107257337 A CN107257337 A CN 107257337A CN 201710452694 A CN201710452694 A CN 201710452694A CN 107257337 A CN107257337 A CN 107257337A
- Authority
- CN
- China
- Prior art keywords
- authority
- function point
- module
- interface
- interface element
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/38—Creation or generation of source code for implementing user interfaces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Abstract
The authority control method and its system shared the invention discloses a kind of multiterminal, including client, it is uniformly accessed into module, authentication control module, the major part of business module four, its control method includes function of initializing point, all control authorities are abstracted as One function point, function point represents a specific function or service;To corresponding function point configuration interface element, the interface element corresponding to concrete function point is defined, interface element and show the expression about being specific interface, associated with the specific end that shows, it is described to show that to hold be a kind of carrier that load bearing interface shows;Authorize, function point is authorized to user and role, allow user to be produced with function point and associate;Control of authority, calls authentication control module to determine whether the user has access rights.The present invention is by configuring authority and interface element relation, only to role's distribution function authority so that a sub-authorization multiterminal share identical authority, it is not necessary to individually authorized for each end, mode of operation is simple.
Description
Technical field
The present invention relates to software control of authority technical field, and in particular to a kind of shared authority control method of multiterminal and its
System.
Background technology
1st, with the popularization of mobile Internet, the appearance of more and more different types of clients(Wechat, mobile phone app,
Pc browsers)So that the performance at interface is more and more diversified, traditional to authorize for each end, works not only heavy, and
Easily error.
Although the 2, tradition mis systems have the control of authority module based on RBAC, based role, the controlling party of resource at present
Formula.But they are frequently not centralized management, and it is difficult shared that permissions data standard, which differs, and is typically to increase in operation system
The realization of the modes such as filter so that Permission Design can not have certain invasive to business across language.
3rd, traditional authorization, is often intercepted in application layer, if programme-control goes wrong.It is easy to out
Existing potential safety hazard and the configuration rule for being not easy to global knowledge authority.
The content of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of multiterminal share authority control method and its
System, by configuring authority and interface element relation, only to role's distribution function authority so that a sub-authorization multiterminal share identical
Authority, it is not necessary to individually authorized for each end, mode of operation is simple, makes system not error-prone using more safety, power
The unified interception of limit is so that business to authority transparence, is more favorable for program portable, and is indifferent to business module to limit using language
System.
The purpose of the present invention is achieved through the following technical solutions:
The shared authority control method of a kind of multiterminal, it is characterised in that comprise the following steps:
Step S01:Function of initializing point, One function point is abstracted as by all control authorities, and function point represents a tool
The function of body or service;
Step S02:To corresponding function point configuration interface element, the interface element corresponding to concrete function point, Interface Element are defined
Element and show the expression about being specific interface, associated with the specific end that shows, it is described show hold a kind of load bearing interface to show
Carrier;
Step S03:Authorize, function point is authorized to user and role, allow user to be produced with function point and associate;
Step S04:Control of authority, calls authentication control module to determine whether the user has access rights.
Further, in addition to step S05:Interface element display, the authority configured according to different user shows difference
Interface, specifically include following sub-step:
Sub-step S51:User accesses back-stage management interface;
Sub-step S52:Obtain active user and role;
Sub-step S53:Corresponding function point is found according to user and role;
Sub-step S54:Correspondence interface element is found according to function point;
Sub-step S55:All higher level's interface elements are found according to current interface element;
Sub-step S56:According to interface element relationship between superior and subordinate assembled interface element;
Sub-step S57:Return to client and show interface element.
Further, in described step S01, the function point and unrelated, the initialization of function point behaviour is specifically shown
Most preferably it is that in addition the initialization operation of function point can also be in other any stage definitions in development phase definition.
Further, in described step S02, function point can be the service or no boundary for having interface to carry
The interface in face, therefore be not that each function point will be corresponding with interface element, function point passes through the URL addresses of client or order
Operational order identification in pattern.
Further, in described step S04, user is all to be asked first through being uniformly accessed into module access server, and
Specific business can not be directly accessed, operation system can directly refuse the illegal request that front end is sent by modes such as fire walls.
Further, it is described to be uniformly accessed into module, in addition to the reverse proxy of service, be also responsible for authority it is unified intercept,
Routing policy is defined, module is uniformly accessed into and is judged according to returning result and access end, the direct access service if authentication passes through
System, correspondence interface or response faultcode are jumped to if failed authentication according to different ends.
Further, authentication control module is called to determine whether the user there are access rights specific in described step S04
Including following sub-step:
Sub-step S41:According to the interface element of access and active user and role, corresponding function point is found;
Sub-step S42:Whether access rule is met according to the configuration determination of authority point;
Sub-step S43:Authenticating result is returned to proxy server.
The shared authority control system of a kind of multiterminal, it is characterised in that including following component:
Client:Refer to corresponding with server, the program of local service is provided for client;
It is uniformly accessed into module:The reverse proxy service and authority for being responsible for all business are intercepted, and are the valves of control of authority;
Authenticate control module:The core controller of control of authority, the inspection for being responsible for concrete power limit control, the specific of control of authority are patrolled
Volume, authority authorizes;
Business module:The service or system that perform specific business are the users of function point;
During client request business module always first request to module is uniformly accessed into, be uniformly accessed into module elder generation according to client id,
Active user ID and URL addresses access authentication control module, authentication control module obtains whether user has according to relevant configuration
Associated rights, it is that will ask reverse proxy to business to be uniformly accessed into module further according to the data decision that authentication control module is returned
End, or error message is directly returned into front end, if having access to business module shows that the user has the function point
Access rights, control of authority is carried out to it without correlative code, business module has handled service logic, by being uniformly accessed into
Module is directly returned to front end.
Further, the advance initialization definitions function point of described authentication control module, and corresponding function point is configured
Interface element.
Further, described interface element mainly includes:Interface title, interface address, interface level, interface correspondence work(
Can point ID.
The beneficial effects of the invention are as follows:1st, only to function point mandate by way of, more facilitate user authorize reduce pipe
Cost is managed, a function point is only configured, all terminals all can be used;2nd, unified management authority makes business module transparent to authority
Change, make the simpler system of Permission Design, more safe and reliable;3rd, all operation systems can not be directly by outside access, can be with
Prevent authority from penetrating, operation system directly refuses all external requests, configuration is simple, not error-prone.
Brief description of the drawings
Fig. 1 is the holistic approach step schematic diagram of the present invention;
Fig. 2 is present system assembly assumption diagram;
Fig. 3 is the detail flowchart of operation principle of the present invention.
Embodiment
Technical scheme is described in further detail below in conjunction with the accompanying drawings, but protection scope of the present invention is not limited to
It is as described below.
As shown in figure 1,
The shared authority control method of a kind of multiterminal, it is characterised in that comprise the following steps:
Step S01:Function of initializing point, One function point is abstracted as by all control authorities, and function point represents a tool
The function of body or service;Function point and specifically show unrelated;
Step S02:To corresponding function point configuration interface element, the interface element corresponding to concrete function point, Interface Element are defined
Element and show the expression about being specific interface, associated with the specific end that shows, it is described show hold a kind of load bearing interface to show
Carrier;Described interface element refers to menu or button etc.;
Step S03:Authorize, function point is authorized to user and role, allow user to be produced with function point and associate;Boundary is not authorized to role
The reason for surface element is:Based on it is thering is corresponding function point authority just to need to show a corresponding interface element it is assumed that function point and
Interface element has relation therefore need not associated again with role in itself, and such operation maintenance personnel and business personnel require no knowledge about
Function point and boundary's relation of plane, it is only necessary to pay close attention to what authority role should possess in itself, simplify Authorized operation.
Step S04:Control of authority, calls authentication control module to determine whether the user has access rights.
Wherein, in the present embodiment function point, interface element, to show end concrete meaning as follows:
Function point:One specific function or service, such as:Modify password, inquiry user, query the balance.
Interface element:Some visible interface visual elements, such as:List or button.
Show end:The carrier that a kind of load bearing interface shows, such as:Wechat, pc browsers, mobile phone app etc.;
Further, in addition to step S05:Interface element display, the authority configured according to different user shows different boundaries
Face, specifically includes following sub-step:
Sub-step S51:User accesses back-stage management interface;
Sub-step S52:Obtain active user and role;
Sub-step S53:Corresponding function point is found according to user and role;
Sub-step S54:Correspondence interface element is found according to function point;
Sub-step S55:All higher level's interface elements are found according to current interface element;
Sub-step S56:According to interface element relationship between superior and subordinate assembled interface element;
Sub-step S57:Return to client and show interface element.
Further, in described step S01, the function point and unrelated, the initialization of function point behaviour is specifically shown
Most preferably it is in development phase definition;In addition the initialization operation of function point can also be in other any stage definitions.
Further, in described step S02, function point can be the service or no boundary for having interface to carry
The interface in face, therefore be not that each function point will be corresponding with interface element, function point passes through the URL addresses of client or order
Operational order identification in pattern.
Further, in described step S04, user is all to be asked first through being uniformly accessed into module access server, and
Specific business can not be directly accessed, operation system can directly refuse the illegal request that front end is sent by modes such as fire walls.
Further, it is described to be uniformly accessed into module, in addition to the reverse proxy of service, be also responsible for authority it is unified intercept,
Routing policy is defined, module is uniformly accessed into and is judged according to returning result and access end, the direct access service if authentication passes through
System, correspondence interface or response faultcode are jumped to if failed authentication according to different ends.
Further, authentication control module is called to determine whether the user there are access rights specific in described step S04
Including following sub-step:
Sub-step S41:According to the interface element of access and active user and role, corresponding function point is found;
Sub-step S42:Whether access rule is met according to the configuration determination of authority point;
Sub-step S43:Authenticating result is returned to proxy server.
As shown in Figure 2:
The shared authority control system of a kind of multiterminal, it is characterised in that including following component:
Client:Refer to corresponding with server, the program of local service is provided for client;
It is uniformly accessed into module:The reverse proxy service and authority for being responsible for all business are intercepted, and are the valves of control of authority;
Authenticate control module:The core controller of control of authority, the inspection for being responsible for concrete power limit control, the specific of control of authority are patrolled
Volume, authority authorizes;
Business module:The service or system that perform specific business are the users of function point;
During client request business module always first request to module is uniformly accessed into, be uniformly accessed into module elder generation according to client id,
Active user ID and URL addresses access authentication control module, authentication control module obtains whether user has according to relevant configuration
Associated rights, it is that will ask reverse proxy to business to be uniformly accessed into module further according to the data decision that authentication control module is returned
End, or error message is directly returned into front end, if having access to business module shows that the user has the function point
Access rights, control of authority is carried out to it without correlative code, business module has handled service logic, by being uniformly accessed into
Module is directly returned to front end.
Further, the advance initialization definitions function point of described authentication control module, and corresponding function point is configured
Interface element.
Further, described interface element mainly includes:Interface title, interface address, interface level, interface correspondence work(
Can point ID.
Specifically, a kind of shared authority control system of multiterminal includes client, is uniformly accessed into module, authentication control mould
Block, business module four are most of.
Client or for user terminal, refers to corresponding with server, and the program of local service is provided for client.Such as:
Pc browsers, wechat, app.
Reverse proxy service and authority interception that module is responsible for all business are uniformly accessed into, is the valve of control of authority.
Core controller, the inspection of responsible concrete power limit control that control module is control of authority are authenticated, control of authority
Specific logic, authority are authorized.
Business module be perform specific business service or system be function point user.
This four big structure is the fundamental of control of authority, and their relation is:
When client request business module, always first request is to being uniformly accessed into module.
Module is uniformly accessed into first according to client id, active user ID and URL addresses access authentication control module.
Authentication control module obtains whether user has associated rights according to relevant configuration.
It is that will ask reverse proxy to business end that module, which is uniformly accessed into, further according to the data decision that authentication control module is returned,
Or error message is directly returned into front end.
If having access to business module shows that the user has had the access rights of the function point, without correlative code
Control of authority is carried out to it.
Business module has handled service logic, and front end is directly returned to by being uniformly accessed into module.
So far whole authority related procedure is finished.
A kind of shared authority control method of multiterminal is as follows:
Step S01:Function of initializing point
Function point is the specific descriptions to function, mainly includes the coding of authority(It is easy to procedure identification), function point title, authority
Matched rule(Support the matching of regular expression), function point and role, the relation of user is multi-to-multi.
Specific practice:Relevant configuration can directly be initialized by modes such as sql scripts, configuration files.
Step S02:Initialize interface element
Interface element mainly includes:Interface title, interface address, interface level, interface corresponding function point ID.Configure they between
Relation the purpose is to:It is counter to inquire user in order to according to the relation between user, role, function point, interface element
Interface element and function point, and pass through the anti-function point for finding user of interface element.
Step S03:Authorize
User and role's associated rights are authorized, i.e., to allocating it function point.Enable to have correlation function operating right and
Show related interfaces element.
Step S04:Control of authority, including following sub-step:
S001, when user accesses a specific front end page by client or services first pass through and be uniformly accessed into module accesses
Back-end services.
S002, it is uniformly accessed into module and receives first access authentication control module after request, it can judges that current request is first
No access rights.Specifically authentication control module can be asked according to interface element ID, request address and active user, and return is
It is no to possess the authority.
S003, authentication control module can find according to active user or role after required parameter is connected to and possess function point,
And according to the corresponding concrete function point of current interface component identification come comprehensive descision, the rule of which currently used function point is entered
Row authentication judges.
S004, authentication judge to be matched according to the rules of competence configured on current URL and function point, and return to matching
As a result it is uniformly accessed into module.If certainly incoming is that other orders can also define regular matched.
S005, it is uniformly accessed into module and can be handled after returning result is connected to according to authenticating result, if returned successfully
As a result then prove there are access rights, reverse proxy to actual services module is subjected to business processing.
If S006, returning to failure, the different unauthorized pages are jumped to according to the client of request, or if
Ajax then returns to corresponding error code, and unified processing is carried out by client, jumps to the unified page or calls primary api to enter
Row business processing.
As shown in Figure 3:Specific operation principle is as follows:
Start;
Developer carries out function of initializing point to authentication control module;
Operation maintenance personnel carries out the initialization of interface element, and definition interfaces element and function point relation to authentication control module;
Back-stage management personnel authorize the function point of correlation by authenticating control module to corresponding role, complete the mandate behaviour of function point
Make;
Client carries out authority access;
Authentication control module finds corresponding function point according to user, role and function point relation;Or according to menu and function point
Relation finds function point;Or function point is found according to incoming rule and function point expression formula;
Authenticating result is returned to module is uniformly accessed into, module is uniformly accessed into and determines whether access rights;
There are access rights, access service system is performed, and is terminated.
Without access rights, front-end interface is returned to, is terminated.
Described above is only the preferred embodiment of the present invention, it should be understood that the present invention is not limited to described herein
Form, is not to be taken as the exclusion to other embodiment, and available for various other combinations, modification and environment, and can be at this
In the text contemplated scope, it is modified by the technology or knowledge of above-mentioned teaching or association area.And those skilled in the art are entered
Capable change and change does not depart from the spirit and scope of the present invention, then all should appended claims of the present invention protection domain
It is interior.
Claims (10)
1. the shared authority control method of a kind of multiterminal, it is characterised in that comprise the following steps:
Step S01:Function of initializing point, One function point is abstracted as by all control authorities, and function point represents a tool
The function of body or service;
Step S02:To corresponding function point configuration interface element, the interface element corresponding to concrete function point, Interface Element are defined
Element and show the expression about being specific interface, associated with the specific end that shows, it is described show hold a kind of load bearing interface to show
Carrier;
Step S03:Authorize, function point is authorized to user and role, allow user to be produced with function point and associate;
Step S04:Control of authority, calls authentication control module to determine whether the user has access rights.
2. a kind of shared authority control method of multiterminal according to claim 1, it is characterised in that:Also include step S05:
Interface element display, the authority configured according to different user shows different interfaces, specifically includes following sub-step:
Sub-step S51:User accesses back-stage management interface;
Sub-step S52:Obtain active user and role;
Sub-step S53:Corresponding function point is found according to user and role;
Sub-step S54:Correspondence interface element is found according to function point;
Sub-step S55:All higher level's interface elements are found according to current interface element;
Sub-step S56:According to interface element relationship between superior and subordinate assembled interface element;
Sub-step S57:Return to client and show interface element.
3. a kind of shared authority control method of multiterminal according to claim 1, it is characterised in that:Described step S01
In, the function point and specifically show unrelated, the initialization operation of function point is defined in the development phase.
4. a kind of shared authority control method of multiterminal according to claim 1, it is characterised in that:Described step S02
In, function point can have the service of interface carrying or the interface without interface, therefore not be that each function point will
Corresponding with interface element, function point is recognized by the operational order in the URL addresses of client or command mode.
5. a kind of shared authority control method of multiterminal according to claim 1, it is characterised in that:Described step S04
In, all requests of user can not directly access specific business first through being uniformly accessed into module access server, and operation system can
Directly to refuse the illegal request that front end is sent by modes such as fire walls.
6. a kind of shared authority control method of multiterminal according to claim 5, it is characterised in that:It is described to be uniformly accessed into mould
Block, in addition to the reverse proxy of service, is also responsible for the unified of authority and intercepts, defines routing policy, is uniformly accessed into module according to returning
Return result and access end judges, the direct access service system if authentication passes through is jumped if failed authentication according to different ends
Go to correspondence interface or response faultcode.
7. a kind of shared authority control method of multiterminal according to any one of claim 1 to 6, it is characterised in that:Institute
Authentication control module is called to determine whether the user there are access rights to specifically include following sub-step in the step S04 stated:
Sub-step S41:According to the interface element of access and active user and role, corresponding function point is found;
Sub-step S42:Whether access rule is met according to the configuration determination of authority point;
Sub-step S43:Authenticating result is returned to proxy server.
8. the shared authority control system of a kind of multiterminal, it is characterised in that including following component:
Client:Refer to corresponding with server, the program of local service is provided for client;
It is uniformly accessed into module:The reverse proxy service and authority for being responsible for all business are intercepted, and are the valves of control of authority;
Authenticate control module:The core controller of control of authority, the inspection for being responsible for concrete power limit control, the specific of control of authority are patrolled
Volume, authority authorizes;
Business module:The service or system that perform specific business are the users of function point;
During client request business module always first request to module is uniformly accessed into, be uniformly accessed into module elder generation according to client id,
Active user ID and URL addresses access authentication control module, authentication control module obtains whether user has according to relevant configuration
Associated rights, it is that will ask reverse proxy to business to be uniformly accessed into module further according to the data decision that authentication control module is returned
End, or error message is directly returned into front end, if having access to business module shows that the user has the function point
Access rights, control of authority is carried out to it without correlative code, business module has handled service logic, by being uniformly accessed into
Module is directly returned to front end.
9. a kind of shared authority control system of multiterminal according to claim 8, it is characterised in that:Described authentication control
The advance initialization definitions function point of module, and to corresponding function point configuration interface element.
10. a kind of shared authority control system of multiterminal according to claim 9, it is characterised in that:Described Interface Element
Element mainly includes:Interface title, interface address, interface level, interface corresponding function point ID.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710452694.6A CN107257337B (en) | 2017-06-15 | 2017-06-15 | Multi-terminal sharing authority control method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710452694.6A CN107257337B (en) | 2017-06-15 | 2017-06-15 | Multi-terminal sharing authority control method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107257337A true CN107257337A (en) | 2017-10-17 |
CN107257337B CN107257337B (en) | 2021-02-05 |
Family
ID=60024154
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710452694.6A Active CN107257337B (en) | 2017-06-15 | 2017-06-15 | Multi-terminal sharing authority control method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107257337B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108646965A (en) * | 2018-05-14 | 2018-10-12 | 平安科技(深圳)有限公司 | Processing method, terminal device and the medium of service line |
CN109766158A (en) * | 2018-12-27 | 2019-05-17 | 益萃网络科技(中国)有限公司 | Methods of exhibiting, device, computer equipment and the storage medium of user interface |
CN110059472A (en) * | 2019-03-16 | 2019-07-26 | 平安城市建设科技(深圳)有限公司 | Menu authority configuring method, device, equipment and readable storage medium storing program for executing |
CN110780876A (en) * | 2019-10-29 | 2020-02-11 | 北京北纬通信科技股份有限公司 | Web development front-end and back-end separation authority control method and system |
CN112202819A (en) * | 2020-12-02 | 2021-01-08 | 成都掌控者网络科技有限公司 | Distributed control authority method and device, computer equipment and storage medium |
CN112528248A (en) * | 2020-12-08 | 2021-03-19 | 北京航天云路有限公司 | User authority management scheme facing multiple applications |
CN112989373A (en) * | 2021-03-08 | 2021-06-18 | 北京慧友云商科技有限公司 | Hierarchical authorization control management engine based on RBAC |
CN113515765A (en) * | 2021-07-12 | 2021-10-19 | 深圳市金斧子网络科技有限公司 | Authority management method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102130894A (en) * | 2010-01-12 | 2011-07-20 | 大唐移动通信设备有限公司 | Authentication and certification method and system |
CN102387139A (en) * | 2011-10-17 | 2012-03-21 | 迈普通信技术股份有限公司 | Authority control method, system and device separated from application services |
US20130019295A1 (en) * | 2011-07-11 | 2013-01-17 | Samsung Electronics Co., Ltd. | Method and system for open authentication |
CN102930189A (en) * | 2012-10-12 | 2013-02-13 | 中标软件有限公司 | Role authority limiting method and system |
CN103065074A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Uniform Resource Locator (URL) authority control method based on fine granularity |
CN103500298A (en) * | 2013-10-12 | 2014-01-08 | 彩虹集团公司 | Method for achieving authorization distribution based on rule management |
-
2017
- 2017-06-15 CN CN201710452694.6A patent/CN107257337B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102130894A (en) * | 2010-01-12 | 2011-07-20 | 大唐移动通信设备有限公司 | Authentication and certification method and system |
US20130019295A1 (en) * | 2011-07-11 | 2013-01-17 | Samsung Electronics Co., Ltd. | Method and system for open authentication |
CN102387139A (en) * | 2011-10-17 | 2012-03-21 | 迈普通信技术股份有限公司 | Authority control method, system and device separated from application services |
CN102930189A (en) * | 2012-10-12 | 2013-02-13 | 中标软件有限公司 | Role authority limiting method and system |
CN103065074A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Uniform Resource Locator (URL) authority control method based on fine granularity |
CN103500298A (en) * | 2013-10-12 | 2014-01-08 | 彩虹集团公司 | Method for achieving authorization distribution based on rule management |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108646965A (en) * | 2018-05-14 | 2018-10-12 | 平安科技(深圳)有限公司 | Processing method, terminal device and the medium of service line |
CN108646965B (en) * | 2018-05-14 | 2021-06-25 | 平安科技(深圳)有限公司 | Service line processing method, terminal device and medium |
CN109766158A (en) * | 2018-12-27 | 2019-05-17 | 益萃网络科技(中国)有限公司 | Methods of exhibiting, device, computer equipment and the storage medium of user interface |
CN110059472A (en) * | 2019-03-16 | 2019-07-26 | 平安城市建设科技(深圳)有限公司 | Menu authority configuring method, device, equipment and readable storage medium storing program for executing |
CN110780876A (en) * | 2019-10-29 | 2020-02-11 | 北京北纬通信科技股份有限公司 | Web development front-end and back-end separation authority control method and system |
CN112202819A (en) * | 2020-12-02 | 2021-01-08 | 成都掌控者网络科技有限公司 | Distributed control authority method and device, computer equipment and storage medium |
CN112528248A (en) * | 2020-12-08 | 2021-03-19 | 北京航天云路有限公司 | User authority management scheme facing multiple applications |
CN112989373A (en) * | 2021-03-08 | 2021-06-18 | 北京慧友云商科技有限公司 | Hierarchical authorization control management engine based on RBAC |
CN113515765A (en) * | 2021-07-12 | 2021-10-19 | 深圳市金斧子网络科技有限公司 | Authority management method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107257337B (en) | 2021-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107257337A (en) | A kind of shared authority control method of multiterminal and its system | |
JP7079798B2 (en) | Systems and methods for dynamic and flexible authentication in cloud services | |
US10484385B2 (en) | Accessing an application through application clients and web browsers | |
US10447684B2 (en) | Hosted application sandbox model | |
US9639678B2 (en) | Identity risk score generation and implementation | |
CN106411857B (en) | A kind of private clound GIS service access control method based on virtual isolation mech isolation test | |
US9479509B2 (en) | Unified system for authentication and authorization | |
JP5530562B2 (en) | Validating domain name system record updates | |
US8825854B2 (en) | DMZ framework | |
US8522333B2 (en) | Client/server system for communicating according to the standard protocol OPC UA and having single sign-on mechanisms for authenticating, and method for performing single sign-on in such a system | |
US9491183B1 (en) | Geographic location-based policy | |
RU2490814C2 (en) | Dynamic dns system for private networks | |
US9571495B2 (en) | Methods and systems for authorizing web service requests | |
US20020178377A1 (en) | Method and system for server support for pluggable authorization systems | |
EP3942775B1 (en) | Application integration using multiple user identities | |
CN110324338B (en) | Data interaction method, device, fort machine and computer readable storage medium | |
JP2016540405A (en) | Secure proxy to protect private data | |
CN103944890A (en) | Virtual interaction system and method based on client/server mode | |
US20170187705A1 (en) | Method of controlling access to business cloud service | |
EP3488589B1 (en) | Login proxy for third-party applications | |
EP4035327A1 (en) | Template-based onboarding of internet-connectible devices | |
CN103152351A (en) | Network equipment and AD (Active Directory) domain single sign on method and system | |
US8909799B2 (en) | File system firewall | |
KR20100060130A (en) | System for protecting private information and method thereof | |
US11405379B1 (en) | Multi-factor message-based authentication for network resources |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |