CN107277038A - Access control method, device and system - Google Patents

Access control method, device and system Download PDF

Info

Publication number
CN107277038A
CN107277038A CN201710585746.7A CN201710585746A CN107277038A CN 107277038 A CN107277038 A CN 107277038A CN 201710585746 A CN201710585746 A CN 201710585746A CN 107277038 A CN107277038 A CN 107277038A
Authority
CN
China
Prior art keywords
business operation
targeted customer
user
mark
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710585746.7A
Other languages
Chinese (zh)
Inventor
陈刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Micro Shadow Era Technology Co Ltd
Original Assignee
Beijing Micro Shadow Era Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Micro Shadow Era Technology Co Ltd filed Critical Beijing Micro Shadow Era Technology Co Ltd
Priority to CN201710585746.7A priority Critical patent/CN107277038A/en
Publication of CN107277038A publication Critical patent/CN107277038A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

This application provides a kind of access control method, device and system, in this scenario, the application server of operation system sends the authentication request for carrying targeted customer's mark and business operation information to authentication server after the business operation request for carrying targeted customer's mark and business operation information is intercepted;Authentication server is designated targeted customer's mark of logged-in user detecting the targeted customer, and when there is the object run authority with the business operation information match in the corresponding object run authority set of targeted customer mark, return to authenticate for application server and successfully indicate, to cause application server to perform business operation according to the business operation information.The scheme of the application can reduce network business platform to realize the development amount needed for Authority Verification, reduce the complexity of Authority Verification.

Description

Access control method, device and system
Technical field
The application is related to communication technical field, more particularly to a kind of access control method, device and system.
Background technology
For providing the network business platform of business, it is necessary to run people during the operation of network business platform Member is managed to network business platform, e.g., for providing the network business platform of multimedia resource, operation personnel's management Network business platform institute energy multimedia resource, changes brief introduction of multimedia resource etc..
Under normal circumstances, network business platform can be made up of multiple operation systems, and different business systems are provided Exercisable business operation species is different.And the operating right that different operation personnel have also is differed, only as operation people Member has to during the operational administrative authority of some business operations, the operation personnel just can be in the business system in some operation system Corresponding service management operation is carried out in system.And in order to carry out Authority Verification, the application clothes of each operation system to operation personnel It is required for developing corresponding Authority Verification function in business device, development amount is larger, is tested so that web traffic platform carries out authority The complexity of card is higher.
The content of the invention
In view of this, this application provides a kind of access control method, device and system, to reduce web traffic platform In order to realize the development amount needed for Authority Verification, the complexity of Authority Verification is reduced.
To achieve the above object, this application provides following scheme:
On the one hand, this application provides a kind of access control method, this method includes:
Intercept and capture the business operation request that the browser of terminal is sent to the application server of operation system, the business operation Request carries targeted customer's mark of the browser rs cache, and the business operation information that request is operated;
In response to the business operation request intercepted, authentication request, the authentication request are sent to authentication server Carry targeted customer's mark and the business operation information;
When receive the authentication server return authenticate successfully indicate when, according to business operation information execution business Operation, wherein, described authenticate successfully is designated as confirming that the targeted customer is designated logged-in user in the authentication server Mark, and the targeted customer identifies corresponding object run authority set and includes and the business operation information match Operating right set after, generation.
It is preferred that, it is described when the authentication server return authenticate successfully indicate when, held according to the business operation information Row business operation, including:
When the authentication for receiving the authentication server return is successfully indicated, the business operation is asked into behaviour The business operation information of work is transmitted to the application server, to cause the application server according to the business operation information Perform business operation.
It is preferred that, the business operation in response to intercepting is asked, and authentication request, bag are sent to authentication server Include:
In response to the business operation request intercepted, the targeted customer carried is asked to identify according to business operation And business operation information, authentication request is generated, the authentication request carries targeted customer's mark and the business Operation information;
The authentication request is sent to authentication server.
On the other hand, present invention also provides another access control method, applied to authentication server, methods described bag Include:
The authentication request that application server is sent is received, the authentication request carries targeted customer's mark and business behaviour Make information, wherein, after the business operation request that authentication request sends for the browser that the application server intercepts terminal, Ask what the business operation information of the targeted customer mark and request operation carried was generated according to business operation, and The targeted customer that business operation request is carried is designated the targeted customer's mark being buffered in the browser;
Detect whether that the targeted customer is designated targeted customer's mark of logged-in user, and the targeted customer identifies In corresponding object run authority set, there is the object run authority with the business operation information match;
When the targeted customer be designated logged-in user targeted customer mark, and the targeted customer mark it is corresponding There is the object run authority with the business operation information match in object run authority set, be the application server Return, which is authenticated, successfully to be indicated, to cause the application server to perform business operation according to the business operation information.
It is preferred that, it is described for the application server return authenticate successfully indicate while, in addition to:
Operation Log of the generation comprising targeted customer mark and the business operation information, and store the operation Daily record.
It is preferred that, it is described to detect whether targeted customer's mark that the targeted customer is designated logged-in user and described Targeted customer is identified in corresponding object run authority set, there is the object run power with the business operation information match Limit, including:
From user's mark of the logged-in user of storage and the corresponding relation of operating right set, inquiry whether there is institute State targeted customer and identify corresponding object run authority set;
When inquiring the corresponding object run authority set of targeted customer's mark, the object run authority is detected With the presence or absence of the object run authority with the business operation information match in set.
It is preferred that, the targeted customer's mark and the corresponding relation of operating right set of the logged-in user from storage In, inquiry identifies corresponding object run authority set with the presence or absence of the targeted customer, including:
The targeted customer's mark and pair of operating right set of the logged-in user stored from long-range memory database In should being related to, inquiry identifies corresponding object run authority set with the presence or absence of the targeted customer.
It is preferred that, before the authentication request that the reception application server is sent, in addition to:
The logging request that the browser of the terminal is sent is received, the logging request carries the user's that request is logged in User name and login password;
When the identity for going out the user based on the user name and login password authentication is legal, according to the user name, All operating rights that the user has are obtained, and all operating rights having are constituted into object run authority set Close;
The targeted customer mark of user described in unique mark is generated, and stores targeted customer's mark and the mesh Mark the corresponding relation of operating right set;
The targeted customer is identified to the browser for sending the terminal, used with caching the target in the browser Family is identified.
It is preferred that, after the browser that the targeted customer is identified to the transmission terminal, in addition to:
Authority selection interface is returned to for the browser, the authority selection interface includes the object run authority set In operations authority menu option;
The mark for the pending operating right that browser is returned is obtained, the pending operating right is user from the power Limit the operating right associated by the menu option of selection interface selection;
Page address according to associated by operating right, is that the browser is returned corresponding to the pending operating right The business operation page page address, to cause the browser according to the services addresses of the business operation page, from institute State application server and obtain the business operation page, and the operation based on user in the business operation page, generate institute State business operation request.
On the other hand, the embodiment of the present application additionally provides a kind of access control apparatus, including:
Request Interception unit, for intercepting and capturing the business operation that the browser of terminal is sent to the application server of operation system Request, the business operation request carries targeted customer's mark of the browser rs cache, and the business behaviour that request is operated Make information;
Authentication request unit, for being asked in response to the business operation intercepted, sends to authentication server and authenticates Request, the authentication request carries targeted customer's mark and the business operation information;
Business execution unit, for when receive the authentication server return authenticate successfully indicate when, according to the industry Operation information of being engaged in performs business operation, wherein, described authenticate successfully is designated as confirming that the target is used in the authentication server Family is designated the mark of logged-in user, and the targeted customer identify corresponding object run authority set include with it is described After the operating right set of business operation information match, generation.
On the other hand, the embodiment of the present application additionally provides a kind of access control apparatus, applied to authentication server, the dress Put including:
Request reception unit, the authentication request for receiving application server transmission, the authentication request carries target User identifies and business operation information, wherein, authentication request is the browser transmission that the application server intercepts terminal Business operation request after, according to business operation ask carry the targeted customer identify and request operation the industry Operation information of being engaged in generation, and the targeted customer that business operation request is carried is designated the mesh being buffered in the browser Mark user's mark;
Authentication process unit, for detecting whether the targeted customer is designated targeted customer's mark of logged-in user, And the targeted customer is identified in corresponding object run authority set, there is the target with the business operation information match Operating right;
As a result indicating member, the targeted customer for being designated logged-in user as the targeted customer identifies, and described Targeted customer identifies the object run existed in corresponding object run authority set with the business operation information match and weighed Limit, is that the application server is returned to authenticate and successfully indicated, to cause the application server according to the business operation information Perform business operation.
On the other hand, present invention also provides a kind of access control system, including:
Application server, is asked, institute for intercepting and capturing the business operation that the browser of terminal is sent to the application server State targeted customer's mark that business operation request carries the browser rs cache, and the business operation information that request is operated; In response to the business operation request intercepted, authentication request is sent to authentication server, the authentication request is carried State targeted customer's mark and the business operation information;When receive the authentication server return authenticate successfully indicate when, Business operation is performed according to the business operation information;
Authentication server, use has been logged in in response to the authentication request, detecting whether that the targeted customer is designated Targeted customer's mark at family, and in the corresponding object run authority set of targeted customer mark, exist and the business is grasped Make the object run authority of information match;When the targeted customer is designated targeted customer's mark of logged-in user, and institute State targeted customer and identify the object run existed in corresponding object run authority set with the business operation information match Authority, is that described authenticate of the application server return successfully indicates.
Understand that in the embodiment of the present application, the application server of operation system can intercept end via above-mentioned technical scheme The business operation request that end is sent, and before application server processes business operation request, send and reflect to authentication server Power request, and verify whether the user of the terminal possesses the business operation carried in business operation request by authentication server The corresponding operating right of information, it is achieved thereby that by authentication server it is unified all business operations in operation system are asked into Row purview certification, it is to avoid the independent exploitation authority authentication procedure in every application server respectively, reduces the work of exploitation Amount and complexity, improve the convenience of purview certification.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme of the embodiment of the present application, used required in being described below to embodiment Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only embodiments herein, for this area For those of ordinary skill, on the premise of not paying creative work, it can also be obtained according to the accompanying drawing of offer other attached Figure.
Fig. 1 shows a kind of structure composed schematic diagram for application scenarios that the access control method of the application is applicable;
Fig. 2 shows a kind of schematic flow sheet of access control method one embodiment of the application;
Fig. 3 shows a kind of composition structural representation of access control apparatus one embodiment of the application;
Fig. 4 shows the composition structural representation of another access control apparatus one embodiment of the application.
Embodiment
In order to make it easy to understand, a kind of application scenarios that first scheme to the embodiment of the present application is applicable are introduced, such as Fig. 1 It is shown.Include in Fig. 1 application scenarios:Network business platform 10 and the terminal 11 where operation personnel.
Wherein, the network business platform can include multiple operation systems 101 and an authentication server 102, business System is connected with authentication server by network.
Wherein, each operation system 101 can include one or more application servers 1011, wherein, work as operation system During including multiple application servers, the plurality of application server may be constructed a server cluster.
Certainly, for authentication and the speed and reliability of purview certification, and avoid due to authentication server failure And lead to not carry out identity and Authority Verification, the authentication server can equally have many.Such as, can be according to load balancing Principle, selection one is used as the authentication server for currently carrying out authentication and purview certification from many authentication servers; And for example, in this many authentication servers one as master server, other are as standby server, as the mirror for master server When weighing server failure, then start the authentication server as standby server.
Wherein, authentication server can safeguard herein below:
The management of authority:Establishment, modification, deletion and inquiry of operations authority etc.;
The management of role:Establishment, modification, deletion and inquiry of role etc., wherein, a role can have one Or multi-mode operation authority;
The management of user right:Assign or withdraw one or more role of user.
Wherein, the keeper of web traffic platform can increase or delete every newly at the rights management interface of AUC The corresponding option of operating right, meanwhile, for each operating right, keeper can set up grasping associated by operations authority Make page address and the corresponding matched rule template of each operating right of the page etc..Wherein, each operating right correspondence Matched rule template be the rule for determining the operation content that this operating right may be matched, e.g., the matched rule Template can be a regular expression, can detect whether the operation content that operation personnel is asked belongs to based on regular expression The extent of competence included in this operating right.
In one implementation, the web traffic platform can also include database 103, and the database can be with the mirror Weigh server by network to be connected, authority, role and user's power that authentication server is managed can be stored in the database The relevant informations such as limit.
With reference to the above general character of the application, the access control method of the embodiment of the present application is described in detail.
Such as, referring to Fig. 2, schematic diagram is interacted it illustrates a kind of flow of access control method one embodiment of the application, The method of the present embodiment can include:
S201, terminal sends logging request by browser to authentication server, and the logging request carries the use of user Name in an account book and login password.
Wherein, authentication server can for request all terminals of logging in network business platform unified log in page is provided Face.Accordingly, user opens the login page of network business platform in the browser of terminal, and fills in and step in the login page Record after the username and password needed for the network business platform, logging request can be sent to the authentication server, then this is stepped on Record request, which is directed, is sent to the authentication server.
In the embodiment of the present application, the user can be the operation personnel of network business platform, and the user name of user can be with One user of unique mark.
S202, authentication server, based on the user name and login password, verifies the body of the user in response to the logging request Part legitimacy.
Such as, the corresponding password of different user name can be stored in authentication server, so, is got entrained by logging request User name after, authentication server detects that the login password is corresponding with the user name close with what is stored in the authentication server Whether code is consistent, if unanimously, it is the user with legal identity to confirm the user.
Certainly, user name and login password based on user, the mode of checking user identity legitimacy can have a variety of, right In the legitimacy which kind of mode to verify user identity using, the embodiment of the present application is not any limitation as.
It should be noted that above step S201 and step S202 is optional step, it belongs to the process of authentication, and Operating right verification process is not belonging to, it is used for the purpose of to readily appreciate the whole process of application scheme and being retouched State.
S203, when the identity that authentication server verifies the user is legal, gathers from the user name of storage with role In incidence relation, the target roles set associated with the user name of the user is inquired.
Wherein, the target roles set includes at least one target roles.For the ease of distinguishing, the embodiment of the present application In, the role of the user-association is referred to as target roles, and the collection that all target roles of user-association are constituted is collectively referred to as Target roles set.
Such as, if in the case of the incidence relation that be stored with the authentication server user name and role gather, can be with The target roles set is inquired from authentication server;If the pass that the user name that is stored with database is gathered with role Connection relation, then can be to inquire the target roles set in database.
Wherein, role be used for characterize the responsibility that user is carried during operation, e.g., role can for logistics transportation, Pre-sales consulting, after-sales service etc..
It is understood that authentication server verify user identity it is legal when, then the user can log in the authentication Server;When the identity that authentication server verifies the user is illegal, the authentication server can return to phase for browser The miscue answered, such as Password Input are operated, and do not possess logon rights etc..
S204, authentication server obtains target roles collection respectively according to the role of storage and the matching relationship of operating right At least one operating right of each target roles association, is obtained and at least one target angle in the target roles set in conjunction The operating right set of color association.
Wherein, the operating right set includes at least one operating right.
Such as, in the role stored from authentication server and the matching relationship of operating right, obtain in the target roles set The operating right of each target roles association;Either, from the role of database purchase and the matching relationship of operating right, Obtain the operating right that each target roles is associated in the target roles set.
In the embodiment of the present application, different roles has different operating rights, according to the difference of operation system, different The operating right that role has can also have the coincidence of part operation authority with entirely different.
Optionally, in order to avoid there is the operating right repeated in the corresponding operating right set of the user, determining In the target roles set of the user after the operations authority of each target roles association, the operating rights of repetition can be removed Limit, and the operating right set that the set that the operations authority obtained by after duplicate removal is constituted has as the user. Certainly, after the operating right set is obtained, then deduplication operation is carried out similarly to the operating right in operating right set It is applicable.
It should be noted that in the embodiment of the present application, by distributing different roles, not each angle for different user It is only a kind of mode for determining the operating right that user has that color, which is associated with least one operating right,.In practical application In, the operating right set that different user has can also be configured in authentication server in advance, what each user had Operating right set includes at least one operating right, in this kind of situation, the user that authentication server can be according to user In name, the user name and the corresponding relation of operating right that are stored from database or the authentication server, user pass is obtained Connection at least one of operating right so that obtain that the user has at least one of the operating right collection that is constituted of operating right Close.
S205, authentication server is that the user generates unique user's mark, and is cached in long-range memory database The user identifies the corresponding relation with the operating right set.
Wherein, the user is identified for the unique mark user, and user mark can be by numeral, letter or other words One or more compositions in symbol.Certainly, the authentication server can also directly using the user name of user as the user use Family is identified.
User name in view of user is easy to be stolen, and is falsely used by other people, therefore, in order to ensure subsequent authority certification Reliability, authentication server can generate a unique user mark for user, be somebody's turn to do after confirming that user identity is legal User's mark is generated at random by authentication server, and user mark is different from the user name of the user.
It is understood that user mark and the corresponding relation of the operating right set are cached in memory database, Be conducive to subsequent authentication server quick search to go out the user and identify which object run authority characterized user has.
Such as, the memory database can be the database mapped between storage key (key) and key assignments (value), i.e. redis Database.Accordingly, can be using user's mark as key, using the corresponding operating right set of user as key assignments, so that should User's mark of user is corresponding with operating right set to be cached in the redis databases.
It should be understood that not in the same time, authentication server may be multiple different logged-in users generation users Mark, for the ease of distinguishing, the user mark that can generate current time is referred to as targeted customer's mark, and the target is used Family identifies corresponding operating right collection and is collectively referred to as object run authority set.
It should be noted that authentication server caches user mark and operating right collection in long-range memory database Corresponding relation between conjunction is only a kind of implementation.But it is understood that, authentication server can also be by the correspondence Relation is cached in the memory of the authentication server or internal memory, or the corresponding relation is cached into other kinds of number According in storehouse, it is not any limitation as herein.
S206, authentication server identifies the user browser for being sent to terminal, to store the user in a browser Mark.
Such as, user mark is written in the cookies of browser.
It is understood that the purpose that authentication server, which is listed user, generates unique user's mark is, It is Successful login authentication server (Successful login network business platform in other words) to characterize the user by user mark Logged-in user.Accordingly, when browser initiates to ask the business operation of operation system, browser can be by caching Service identification is carried in business operation request, and so, authentication server can detect that the user is identified whether as the authentication Server is user's mark that logged-in user is generated.
It should be noted that authentication server for logged-in user generation user by identifying and storing user mark only Only it is a kind of implementation that authentication server recognizes logged-in user, in actual applications, authentication server can also be by Long-range memory database or designated memory space are arrived in the storage of the information such as the user name of login user, and use has been logged in distinguish Family.
In addition, step S203 to step S206 logs in authentication server just for the sake of user's request, (request is stepped in other words Record network business platform) during, authentication server is for some processing of logging request, and the part is not belonging to authentication service Device is for the process of purview certification, and some only done for follow-up Authority Verification prepare operation.
S207, authentication server returns to authority selection interface to the browser of terminal.
Wherein, the authority selection interface shows the operations authority in the operating right set for having the user to possess Option.
Such as, the items included in the operating right set can be shown in the form of menus in the authority selection interface The corresponding menu option of operating right, so, user can characterize the menu option of different operation authority by clicking on, to realize Selection to a certain operating right.
S208, the option mark for the pending operating right that the browser of terminal selects user from the authority selection interface Knowledge is sent to authentication server.
For the ease of distinguishing, by the operating right set, the operating right that user selects is referred to as pending operating rights Limit.
Wherein, the Option of the pending operating right is used to identify the pending operating right, e.g., the pending behaviour The Option for making authority can be the title of the pending operating right or other marks etc..
For example, showing operating right A menu option A, operating right B menu option in authority selection interface And operating right C menu option C, it is assumed that user clicks operating right B menu option B, then browser can be by dish Uniterming B coordinate position or identification number etc. are sent to authentication server, to cause authentication server to be selected according to menu Item B coordinate position or identification number, determines the menu option that user clicks on, and then determine the behaviour of menu option association Make authority for operating right B.
S209, the page address for the business operation page that authentication server is associated based on the pending operating right, at this The webpage representation region of authority selection interface shows the business operation page.
Wherein, the business operation page can show:The business operation project for being available for user to select, and configuration may be selected Business operation content, for example, the film information for having some to be available for modification can be showed in the business operation page, in the business operation In interface, user can perform modification for some film or delete the operation such as movie name.
Be stored with the page of different operation authority and the exercisable business operation page of the operating right in authentication server Incidence relation between face, authentication server is got after the pending operating right of user's selection, can be obtained this and be waited to locate The page address of the business operation page of operating right association is managed, is somebody's turn to do so that the page address based on the business operation page is obtained The business operation page.Such as, the page address for the business operation page that authentication server can associate the pending operating right The browser of terminal is sent to, the browser can be based on the page address, to the operation system belonging to the business operation page Application server send page request, so as to get the business operation page.
It is understood that the mode for showing the business operation page in the browser of terminal can have a variety of.In order to just While user is watching or operated the business operation page, browser can select business operation webpage representation in the authority Designated area in interface is selected, the designated area can be the webpage representation region for showing the business operation page.Accordingly, exist While the authority displaying interface business operation page, user then can be still selected if it is desired to change selected operating right The option of other operating rights is selected, so as to reload the corresponding business operation page of other operating rights.
S210, the operation of the browser of terminal according to user in the business operation page, business is sent to application server Operation requests.
Wherein, business operation request carries user's mark of browser rs cache, and the business operation that request is operated Information.For the ease of distinguishing, the user's mark carried in business operation request can also be referred to as targeted customer's mark.
Such as, browser according to user in the selected business operation project of the business operation page and selected operation The information such as content, generation business operation request, and the user mark cached in cookies is obtained, and user request is taken Band is in business operation request.
It is understood that the browser that step S207 to step S210 is only terminal sends business to application server A kind of implementation of operation requests, in actual applications, the browser of terminal can also be by other means to operation system Application server send business operation request, be not any limitation as the application.
S211, application server intercepts and captures business operation request, and the user's mark for asking to carry based on the business operation And business operation information, generate authentication request.
Wherein, the authentication request includes user mark and business operation information.
The business operation request itself received is intercepted and captured in application server, and in the application server processes business operation Before request, first the user for being sent to business operation request is authenticated.
Such as, interception application can be installed in the application server, the interception application can regard the authentication server as Corresponding client, the business operation that the browser that the interception application can intercept terminal is sent to the application server please Ask, so, before application server processes business operation request, the interception application can generate an authentication request.
S212, application server is sent to authentication request to authentication server.
It is understood that step S211 and step S212 should for the interception in application server in other words application server With a kind of implementation that authentication request is sent to authentication server.In actual applications, application server can be in response to cutting The business operation request received, authentication request is sent to authentication server, and the user's mark carried during business operation is asked Know and business operation information is sent to authentication server in the lump with authentication request.
S213, authentication server is identified according to the user, the logged-in user stored from the long-range memory database User's mark with the corresponding relation of operating right set, inquiry identifies corresponding object run authority with the presence or absence of the user Set, if it is, performing step S214;If it is not, then returning to the prompting of failed authentication to application server;
It is understood that after each User logs in authentication server, the user can be all stored in memory database Corresponding relation between the operating right set that user identifies and the user has, so, in memory database can store multigroup Corresponding relation.Accordingly, if the user carried in the authentication request that is stored with memory database identifies corresponding operation Authority set, then it is the use that logged-in user is generated to illustrate that the user carried in business operation request is designated authentication server Family is identified, while the user that also explanation initiates business operation request is logged-in user.
For the ease of distinguishing, operating right collection corresponding with the user's mark carried in the authentication request is collectively referred to as target Operating right set.
It is understood that the operation that authentication server has user's mark of logged-in user with the logged-in user Authority set is stored into the memory database, so, and business operation is initiated by the browser of terminal in the logged-in user Request, and application server be based on the business operation ask to authentication server initiation authentication request after, authentication server without Need the real-time query logged-in user has again role, and the authority that each role has, it is to avoid inquiry operation The complexity of authority;And using user mark as key assignments, user mark institute just can be inquired from the memory database Corresponding object run authority set, determines that the user identifies the operating rights that characterized user has so as to substantially increase Limit the efficiency of set.
Certainly, if authentication server is logged-in user generation determining that the user is designated the authentication server After mark, from database real-time matching go out the user and identify all operating rights that characterized user has, It is equally applicable to the embodiment of the present application.
It should be noted that the corresponding relation storage that user is identified with operating right set is arrived into authentication in authentication server In the case of server, other database memory spaces, authentication server can still be stored from corresponding memory space User's mark of login user is with the corresponding relation of operating right set, inquiring about and identifying corresponding target with the presence or absence of the user Operating right set, the application is not any limitation as to this.
S214, authentication server is detected in the object run authority set, if existed and the business operation information phase At least one the object run authority matched somebody with somebody, is successfully indicated, and perform step S215 if it is, returning to authenticate for application server; If it is not, then returning to the prompting of failed authentication to application server.
For the ease of distinguishing, by least one of included operating right in object run authority set, with the business The operating right of operation information matching is referred to as object run authority.
If it is understood that there is the target with the business operation information match in the object run authority set Operating right, then illustrating the browser of the terminal has the authority for carrying out the corresponding business operation of the business operation information, In the case of this kind, authentication server thinks that the user identifies characterized user and has the execution corresponding industry of business operation information The authority of business operation, and confirm that authentication passes through, so as to return to authentication successfully instruction to application server.
Wherein, authentication server is from object run authority set, and detection and the target of the business operation information matches are grasped Making the process of authority can be:Whether the business operation content that detection operations authority may relate to includes contains in other words The business operation information is covered, if the business operation content detected involved by a certain operating right covers business operation letter Breath, it is determined that this business operations competence is the object run authority with the business operation information matches.
If grasped it is understood that each operating right may relate into all business in view of authentication server Make content and be set out, memory data output can be caused excessive and the problems such as match complexity is high, optionally, the authentication Server can build the Back ground Information that the business operation content corresponding to each operating right has in advance, so, be based on The Back ground Information that business operation corresponding to each operating right of the business operation information and this has is matched, so that it is determined that The operating right of business operation information matches.Such as, it can determine what business operation information was matched by way of canonical is matched Object run authority.
Detect whether that the user is designated it is understood that step S213 and step S214 are only one kind and logged in use Targeted customer's mark at family, and in the corresponding object run authority set of targeted customer mark, exist and the business operation is believed A kind of implementation of the object run authority of manner of breathing matching, for detecting that the user is identified whether as authentication by other means Server is the mark that logged-in user is generated, and analyzes whether the characterized user of user mark has to the business operation The mode of the related operating right of information, is applied equally to the embodiment of the present application, is not any limitation as herein.
It is understood that in the case where authentication server returns to the prompting of failed authentication to application server, application Server can abandon business operation request, without performing the business operation related to the business operation information.
S215, Operation Log of the authentication server generation comprising user mark and the business operation information, and store The Operation Log.
By Operation Log it is recognized that during operation, different user identifies which characterized user carried out Business operation.
Certainly, if the business operation request that browser is sent carries the information such as the user name of user, in this kind of situation Under, the corresponding relation of the information such as the user name and the business operation information can also be recorded in Operation Log.
In the embodiment of the present application, by authentication server when authenticating successfully, based on business operation information generation operation day Will, so, all Operation Logs complete record by authentication server, without respectively in the application clothes of each operation system The program for realizing operation log recording is individually developed in business device, development amount is greatly reduced, improves Operation Log The convenience of record.
Explanation is needed, the order that authentication server generation Operation Log authenticates successfully instruction with sending is not limited to Fig. 2 Shown, in actual applications, authentication server can also first generate Operation Log, retransmit to authenticate and successfully indicate, certainly, authentication Server can also to application server send authenticate successfully indicate while, generate the Operation Log.
S216, application server performs business operation according to the business operation information.
Such as, the business operation information is the modification for some movie name, then application server can be performed to the electricity Modification of shadow title etc. is operated.
In the embodiment of the present application, the application server of operation system can intercept the business operation request of terminal transmission, and Before application server processes business operation request, authentication request is sent to authentication server, and pass through authentication server Verify whether the user of the terminal possesses the corresponding operating right of business operation information carried in business operation request, so that Realize purview certification is carried out to all business operation requests in operation system by the way that authentication server is unified, it is to avoid exist respectively Authority authentication procedure is individually developed in every application server, the workload and complexity of exploitation is reduced, improves authority and recognize The convenience of card.
Meanwhile, the authority selection interface for the operating right that the user possesses is returned to user by authentication server, so, If user does not possess a certain operating right, the operating right will not be shown in the authority selection interface, so, user is also Corresponding operating right can not be selected by mouse or keyboard in the authority selection interface, so as to can not ask to the operation The related business operation of authority.
Even if in addition, exist user malice get the page address that the user does not possess the business operation of operating right, And be have sent by browser to the application server of operation system to the request of the corresponding business operation in the page address, and due to After application server intercepts business operation request in the application, it can ask to send out to authentication server based on the business operation Authentication request is sent, so, if authentication server detects the user and was not logged on authentication server, or does not possess the industry The operating right for the business operation information that business operation requests are asked, authentication server can still lose to application server feedback authentication The prompting lost, so that the user can not possibly perform the corresponding business behaviour of the business operation information in the application server Make, and then improve the reliability of purview certification.
A kind of access control method of correspondence the application, present invention also provides a kind of access control apparatus, the access control Device processed can apply to application server, or be deployed in the front end of application server, be sent out with intercepting to application server The information sent.
Such as, referring to Fig. 3, it illustrates a kind of composition structural representation of access control apparatus one embodiment of the application, The access control apparatus of the present embodiment can include:
Request Interception unit 301, for intercepting and capturing the business that the browser of terminal is sent to the application server of operation system Operation requests, the business operation request carries targeted customer's mark of the browser rs cache, and the industry that request is operated Business operation information;
Authentication request unit 302, for being asked in response to the business operation intercepted, sends to authentication server and reflects Power request, the authentication request carries targeted customer's mark and the business operation information;
Business execution unit 303, for when receive the authentication server return authenticate successfully indicate when, according to described in Business operation information performs business operation, wherein, described authenticate successfully is designated as confirming the target in the authentication server User is designated the mark of logged-in user, and the targeted customer identifies corresponding object run authority set and included and institute After the operating right set for stating business operation information match, generation.
Optionally, the business execution unit, including:
Business triggers execution unit, for when the authentication for receiving the authentication server return is successfully indicated, by institute Stating business operation asks the business operation information of operation to be transmitted to the application server, to cause the application service Device performs business operation according to the business operation information.
Optionally, the authentication request unit, including:
Generation unit is asked, for asking in response to the business operation intercepted, is asked to carry according to business operation Targeted customer mark and business operation information, generate authentication request, the authentication request carries the target and used Family is identified and the business operation information;
Authentication request transmitting element, for sending the authentication request to authentication server.
Another aspect, present invention also provides another access control method, e.g., referring to Fig. 4, it illustrates the application The composition structural representation of another access control apparatus one embodiment, the device of the present embodiment can apply to authentication service Device, the device of the present embodiment can include:
Request reception unit 401, the authentication request for receiving application server transmission, the authentication request carries mesh User's mark and business operation information are marked, wherein, authentication request is the browser hair that the application server intercepts terminal After the business operation request sent, according to business operation asks targeted customer mark and the request operation of carrying The generation of business operation information, and the targeted customer that business operation request is carried is designated and is buffered in the browser Targeted customer identifies;
Authentication process unit 402, for detecting whether the targeted customer is designated targeted customer's mark of logged-in user Know, and the targeted customer is identified in corresponding object run authority set, is existed and the business operation information match Object run authority;
As a result indicating member 403, the targeted customer for being designated logged-in user as the targeted customer identifies, and institute State targeted customer and identify the object run existed in corresponding object run authority set with the business operation information match Authority, is that the application server is returned to authenticate and successfully indicated, to cause the application server to believe according to the business operation Breath performs business operation.
In a kind of possible implementation, the device can also include:
Daily record generation unit 404, successfully refers to for returning to authenticate for the application server in the result indicating member While showing, Operation Log of the generation comprising targeted customer mark and the business operation information, and store the behaviour Make daily record.
In a kind of possible implementation, the authentication process unit can include:
Information inquiry subelement, user's mark pass corresponding with operating right set for the logged-in user from storage In system, inquiry identifies corresponding object run authority set with the presence or absence of the targeted customer;
Permission match unit, for when inquiring the corresponding object run authority set of targeted customer's mark, examining Survey in the object run authority set with the presence or absence of the object run authority with the business operation information match.
In a kind of possible implementation, described information inquiry subelement, specifically, for from long-range internal storage data Targeted customer's mark of the logged-in user stored in storehouse is with the corresponding relation of operating right set, inquiring about with the presence or absence of described Targeted customer identifies corresponding object run authority set.
In a kind of possible implementation, described device can also include:
Log in receiving unit, for the request reception unit receive application server send authentication request before, Receive the terminal browser send logging request, the logging request carry request log in user user name and Login password;
Authority acquiring unit, the identity for that ought go out the user based on the user name and login password authentication is legal When, according to the user name, obtain all operating rights that the user has, and by all operating right groups having Into object run authority set;
Identification generation unit, the targeted customer for generating user described in unique mark identifies, and stores the mesh Mark user's mark and the corresponding relation of the object run authority set;
Returning unit is identified, the browser of the terminal is sent for the targeted customer to be identified, to be browsed described Targeted customer's mark is cached in device.
On the basis of any of the above one embodiment, the device can also include:
Authority interface returning unit, for returning to authority selection interface, the authority selection interface bag for the browser Include the menu option of the operations authority in the object run authority set;
Operating right determining unit, the mark of the pending operating right for obtaining browser return is described pending Operating right is the operating right associated by the menu option that user is selected from the authority selection interface;
Page returning unit, is to be treated described in the browser is returned for the page address according to associated by operating right The page address of the business operation page corresponding to operating right is handled, to cause the browser according to business operation page The services addresses in face, the business operation page is obtained from the application server, and based on user in business operation page Operation in face, generates the business operation request.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation be all between difference with other embodiment, each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that A little key elements, but also other key elements including being not expressly set out, or also include be this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except also there is other identical element in the process including key element, method, article or equipment.
The foregoing description of the disclosed embodiments, enables those skilled in the art to realize or using the present invention.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and generic principles defined herein can Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with features of novelty with principles disclosed herein most wide Scope.
It the above is only the preferred embodiment of the present invention, it is noted that come for those skilled in the art Say, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should be regarded as Protection scope of the present invention.

Claims (10)

1. a kind of access control method, it is characterised in that including:
Intercept and capture the business operation request that the browser of terminal is sent to the application server of operation system, the business operation request Carry targeted customer's mark of the browser rs cache, and the business operation information that request is operated;
In response to the business operation request intercepted, authentication request is sent to authentication server, the authentication request is carried There is the targeted customer to identify and the business operation information;
When receive the authentication server return authenticate successfully indicate when, perform business according to the business operation information and grasp Make, wherein, described authenticate successfully is designated as confirming that the targeted customer is designated logged-in user in the authentication server Identify, and the targeted customer identifies corresponding object run authority set and included and the business operation information match After operating right set, generation.
2. access control method according to claim 1, it is characterised in that the business in response to intercepting is grasped Ask, authentication request is sent to authentication server, including:
In response to intercept the business operation request, according to business operation ask carry the targeted customer mark and Business operation information, generates authentication request, and the authentication request carries targeted customer's mark and the business operation Information;
The authentication request is sent to authentication server.
3. a kind of access control method, it is characterised in that applied to authentication server, methods described includes:
The authentication request that application server is sent is received, the authentication request carries targeted customer's mark and business operation letter Breath, wherein, after the business operation request that authentication request sends for the browser that the application server intercepts terminal, according to The business operation information generation that the targeted customer mark and request that the business operation request is carried are operated, and The targeted customer that the business operation request is carried is designated the targeted customer's mark being buffered in the browser;
Detect whether that the targeted customer is designated targeted customer's mark of logged-in user, and targeted customer mark correspondence Object run authority set in, there is the object run authority with the business operation information match;
When the targeted customer is designated targeted customer's mark of logged-in user, and the corresponding target of targeted customer mark There is the object run authority with the business operation information match in operating right set, be that the application server is returned Authenticate and successfully indicate, to cause the application server to perform business operation according to the business operation information.
4. access control method according to claim 3, it is characterised in that reflected in described returned for the application server Weigh while successfully indicate, in addition to:
Operation Log of the generation comprising targeted customer mark and the business operation information, and store the operation day Will.
5. access control method according to claim 3, it is characterised in that described to detect whether targeted customer's mark Identified for the targeted customer of logged-in user, and the targeted customer is identified in corresponding object run authority set, exist with The object run authority of the business operation information match, including:
From user's mark of the logged-in user of storage and the corresponding relation of operating right set, inquiry whether there is the mesh Mark user and identify corresponding object run authority set;
When inquiring the corresponding object run authority set of targeted customer's mark, the object run authority set is detected In with the presence or absence of object run authority with the business operation information match.
6. the access control method according to claim any one of 3-5, it is characterised in that in the reception application server Before the authentication request of transmission, in addition to:
The logging request that the browser of the terminal is sent is received, the logging request carries the user for the user that request is logged in Name and login password;
When the identity for going out the user based on the user name and login password authentication is legal, according to the user name, obtain All operating rights that the user has, and all operating rights having are constituted into object run authority set;
The targeted customer mark of user described in unique mark is generated, and stores targeted customer's mark and is grasped with the target Make the corresponding relation of authority set;
The targeted customer is identified to the browser for sending the terminal, marked with caching the targeted customer in the browser Know.
7. access control method according to claim 6, it is characterised in that sent in described identify the targeted customer After the browser of the terminal, in addition to:
Authority selection interface is returned to for the browser, the authority selection interface is included in the object run authority set The menu option of operations authority;
The mark for the pending operating right that browser is returned is obtained, the pending operating right is that user selects from the authority Select the operating right associated by the menu option of interface selection;
Page address according to associated by operating right, is the industry corresponding to the browser return pending operating right The page address for operation pages of being engaged in, to cause the browser according to the services addresses of the business operation page, to be answered from described The business operation page, and the operation based on user in the business operation page are obtained with server, the industry is generated Business operation requests.
8. a kind of access control apparatus, it is characterised in that including:
Request Interception unit, please for intercepting and capturing the business operation that the browser of terminal is sent to the application server of operation system Ask, the business operation request carries targeted customer's mark of the browser rs cache, and the business operation that request is operated Information;
Authentication request unit, for being asked in response to the business operation intercepted, authentication request is sent to authentication server, The authentication request carries targeted customer's mark and the business operation information;
Business execution unit, for when receive the authentication server return authenticate successfully indicate when, grasped according to the business Make information and perform business operation, wherein, described authenticate successfully is designated as confirming targeted customer's mark in the authentication server Know the mark for logged-in user, and the targeted customer identifies corresponding object run authority set and included and the business After the operating right set that operation information matches, generation.
9. a kind of access control apparatus, it is characterised in that applied to authentication server, described device includes:
Request reception unit, the authentication request for receiving application server transmission, the authentication request carries targeted customer Mark and business operation information, wherein, authentication request is that the application server intercepts the industry that the browser of terminal is sent After operation requests of being engaged in, the targeted customer carried is asked to identify and ask the industry of operation according to the business operation Operation information of being engaged in generation, and the targeted customer that business operation request is carried is designated and is buffered in the browser Targeted customer mark;
Authentication process unit, for detecting whether the targeted customer is designated targeted customer's mark of logged-in user, and institute State targeted customer to identify in corresponding object run authority set, there is the object run with the business operation information match Authority;
As a result indicating member, the targeted customer for being designated logged-in user as the targeted customer identifies, and the target User identifies the object run authority existed in corresponding object run authority set with the business operation information match, is The application server is returned to authenticate and successfully indicated, to cause the application server to perform industry according to the business operation information Business operation.
10. a kind of access control system, it is characterised in that including:
Application server, is asked, the industry for intercepting and capturing the business operation that the browser of terminal is sent to the application server Business operation requests carry targeted customer's mark of the browser rs cache, and the business operation information that request is operated;Response In the business operation request intercepted, authentication request is sent to authentication server, the authentication request carries the mesh Mark user's mark and the business operation information;When receive the authentication server return authenticate successfully indicate when, foundation The business operation information performs business operation;
Authentication server, in response to the authentication request, detecting whether that the targeted customer is designated logged-in user Targeted customer is identified, and the targeted customer is identified in corresponding object run authority set, is existed and is believed with the business operation The object run authority of manner of breathing matching;When the targeted customer is designated targeted customer's mark of logged-in user, and the mesh Mark user and identify the object run authority existed in corresponding object run authority set with the business operation information match, Described authenticate is returned to for the application server successfully to indicate.
CN201710585746.7A 2017-07-18 2017-07-18 Access control method, device and system Pending CN107277038A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710585746.7A CN107277038A (en) 2017-07-18 2017-07-18 Access control method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710585746.7A CN107277038A (en) 2017-07-18 2017-07-18 Access control method, device and system

Publications (1)

Publication Number Publication Date
CN107277038A true CN107277038A (en) 2017-10-20

Family

ID=60078788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710585746.7A Pending CN107277038A (en) 2017-07-18 2017-07-18 Access control method, device and system

Country Status (1)

Country Link
CN (1) CN107277038A (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173839A (en) * 2017-12-26 2018-06-15 北京奇虎科技有限公司 Right management method and system
CN108512835A (en) * 2018-03-15 2018-09-07 链家网(北京)科技有限公司 A kind of business unique identification code verification method and system
CN108629484A (en) * 2018-03-30 2018-10-09 平安科技(深圳)有限公司 It attends a banquet qualification management method, apparatus and storage medium
CN108881170A (en) * 2018-05-21 2018-11-23 阿里巴巴集团控股有限公司 A kind of data processing method, device, processing equipment and the system of authorization guidance
CN108965326A (en) * 2018-08-21 2018-12-07 南京国电南自电网自动化有限公司 A kind of boss's station secure communication control method and system based on user identity authentication
CN108989315A (en) * 2018-07-23 2018-12-11 广州视源电子科技股份有限公司 Identity authentication method, device and system
CN109063437A (en) * 2018-08-01 2018-12-21 郑州市景安网络科技股份有限公司 A kind of asset of equipments operation audit method, device, equipment and readable storage medium storing program for executing
CN109617926A (en) * 2019-01-28 2019-04-12 广东淘家科技有限公司 Control method, device and the storage medium of service authority
CN109635222A (en) * 2018-12-07 2019-04-16 深圳前海微众银行股份有限公司 Webpage privilege control method, apparatus, equipment and computer readable storage medium
CN109683942A (en) * 2018-11-13 2019-04-26 平安科技(深圳)有限公司 Script management method, device, medium and electronic equipment
CN109740328A (en) * 2019-01-08 2019-05-10 广州虎牙信息科技有限公司 A kind of right authentication method, device, computer equipment and storage medium
CN109857577A (en) * 2019-01-28 2019-06-07 北京三快在线科技有限公司 Access control method, device, medium and electronic equipment
CN110430213A (en) * 2019-08-15 2019-11-08 北京奇艺世纪科技有限公司 Service request processing method, apparatus and system
CN110798471A (en) * 2019-10-31 2020-02-14 宁波奥克斯电气股份有限公司 Air conditioner management method and related device
CN110851688A (en) * 2019-11-11 2020-02-28 上海燕汐软件信息科技有限公司 Page request method, device and equipment
CN111131324A (en) * 2019-12-31 2020-05-08 北京网众共创科技有限公司 Login method and device of business system, storage medium and electronic device
CN111259429A (en) * 2020-02-10 2020-06-09 支付宝(杭州)信息技术有限公司 Resource operation authority control method and device and electronic equipment
CN111416813A (en) * 2020-03-16 2020-07-14 山东浪潮通软信息科技有限公司 Data filtering system based on reverse proxy service and implementation method
CN111444483A (en) * 2020-03-26 2020-07-24 杭州指令集智能科技有限公司 Authentication method, device and equipment
CN111737717A (en) * 2020-06-28 2020-10-02 深信服科技股份有限公司 Authority management and control method, system, equipment and computer readable storage medium
CN111783050A (en) * 2020-07-02 2020-10-16 浪潮云信息技术股份公司 Role and authority control system of website user
CN111966996A (en) * 2019-05-20 2020-11-20 杭州海康威视数字技术股份有限公司 Data processing method and device
CN112036888A (en) * 2020-08-05 2020-12-04 北京文思海辉金信软件有限公司 Business operation execution method and device, computer equipment and storage medium
CN112287308A (en) * 2020-10-23 2021-01-29 深圳云之家网络有限公司 Service role authentication method and related device
CN112417402A (en) * 2020-11-27 2021-02-26 亿企赢网络科技有限公司 Authority control method, authority control device and storage medium
CN112464212A (en) * 2020-03-30 2021-03-09 上海汇招信息技术有限公司 Data authority control reconstruction method based on mature complex service system
CN112738100A (en) * 2020-12-29 2021-04-30 北京天融信网络安全技术有限公司 Authentication method, device, authentication equipment and authentication system for data access
CN112965901A (en) * 2021-03-05 2021-06-15 北京百度网讯科技有限公司 API testing method, server, system and electronic equipment
CN113032749A (en) * 2021-03-03 2021-06-25 北京读我网络技术有限公司 Synchronous authentication method and device
CN113343273A (en) * 2021-06-30 2021-09-03 重庆渝高科技产业(集团)股份有限公司 User login method, first server and computer readable storage medium
CN113589986A (en) * 2021-07-30 2021-11-02 上海公装无忧装饰工程有限公司 Business process management method, system, electronic device and storage medium
CN113641971A (en) * 2021-08-20 2021-11-12 武汉极意网络科技有限公司 Exception handling system based on behavior verification
CN113765676A (en) * 2021-09-18 2021-12-07 平安国际智慧城市科技股份有限公司 Interface access control method based on multiple user identities and related equipment
CN114417283A (en) * 2022-01-21 2022-04-29 芜湖雄狮汽车科技有限公司 Authority matching method and device for Internet of vehicles users, client and storage medium
CN115242474A (en) * 2022-07-14 2022-10-25 观澜网络(杭州)有限公司 Real-time communication system, method, terminal equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034186A (en) * 2009-09-29 2011-04-27 中国移动通信集团四川有限公司 Device and method for determining object user in mobile communication system
US20130218676A1 (en) * 2012-02-17 2013-08-22 Yahoo! Inc. Guaranteed Retargeting in Online Advertising
CN106529324A (en) * 2016-09-06 2017-03-22 北京三快在线科技有限公司 Method and device for switching user identity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034186A (en) * 2009-09-29 2011-04-27 中国移动通信集团四川有限公司 Device and method for determining object user in mobile communication system
US20130218676A1 (en) * 2012-02-17 2013-08-22 Yahoo! Inc. Guaranteed Retargeting in Online Advertising
CN106529324A (en) * 2016-09-06 2017-03-22 北京三快在线科技有限公司 Method and device for switching user identity

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173839A (en) * 2017-12-26 2018-06-15 北京奇虎科技有限公司 Right management method and system
CN108512835A (en) * 2018-03-15 2018-09-07 链家网(北京)科技有限公司 A kind of business unique identification code verification method and system
CN108629484A (en) * 2018-03-30 2018-10-09 平安科技(深圳)有限公司 It attends a banquet qualification management method, apparatus and storage medium
WO2019223390A1 (en) * 2018-05-21 2019-11-28 阿里巴巴集团控股有限公司 Authorization guidance data processing method, apparatus, device and system
CN108881170A (en) * 2018-05-21 2018-11-23 阿里巴巴集团控股有限公司 A kind of data processing method, device, processing equipment and the system of authorization guidance
TWI706653B (en) * 2018-05-21 2020-10-01 香港商阿里巴巴集團服務有限公司 Authorized guided data processing method, device, processing equipment and system
CN108989315A (en) * 2018-07-23 2018-12-11 广州视源电子科技股份有限公司 Identity authentication method, device and system
CN109063437A (en) * 2018-08-01 2018-12-21 郑州市景安网络科技股份有限公司 A kind of asset of equipments operation audit method, device, equipment and readable storage medium storing program for executing
CN108965326A (en) * 2018-08-21 2018-12-07 南京国电南自电网自动化有限公司 A kind of boss's station secure communication control method and system based on user identity authentication
CN109683942A (en) * 2018-11-13 2019-04-26 平安科技(深圳)有限公司 Script management method, device, medium and electronic equipment
CN109683942B (en) * 2018-11-13 2024-05-24 平安科技(深圳)有限公司 Script management method, script management device, script management medium and electronic equipment
CN109635222A (en) * 2018-12-07 2019-04-16 深圳前海微众银行股份有限公司 Webpage privilege control method, apparatus, equipment and computer readable storage medium
CN109740328B (en) * 2019-01-08 2021-07-02 广州虎牙信息科技有限公司 Authority identification method and device, computer equipment and storage medium
CN109740328A (en) * 2019-01-08 2019-05-10 广州虎牙信息科技有限公司 A kind of right authentication method, device, computer equipment and storage medium
CN109857577A (en) * 2019-01-28 2019-06-07 北京三快在线科技有限公司 Access control method, device, medium and electronic equipment
CN109617926A (en) * 2019-01-28 2019-04-12 广东淘家科技有限公司 Control method, device and the storage medium of service authority
CN111966996A (en) * 2019-05-20 2020-11-20 杭州海康威视数字技术股份有限公司 Data processing method and device
CN110430213A (en) * 2019-08-15 2019-11-08 北京奇艺世纪科技有限公司 Service request processing method, apparatus and system
CN110798471A (en) * 2019-10-31 2020-02-14 宁波奥克斯电气股份有限公司 Air conditioner management method and related device
CN110798471B (en) * 2019-10-31 2022-01-25 宁波奥克斯电气股份有限公司 Air conditioner management method and related device
CN110851688A (en) * 2019-11-11 2020-02-28 上海燕汐软件信息科技有限公司 Page request method, device and equipment
CN111131324A (en) * 2019-12-31 2020-05-08 北京网众共创科技有限公司 Login method and device of business system, storage medium and electronic device
CN111259429A (en) * 2020-02-10 2020-06-09 支付宝(杭州)信息技术有限公司 Resource operation authority control method and device and electronic equipment
CN111416813A (en) * 2020-03-16 2020-07-14 山东浪潮通软信息科技有限公司 Data filtering system based on reverse proxy service and implementation method
CN111444483A (en) * 2020-03-26 2020-07-24 杭州指令集智能科技有限公司 Authentication method, device and equipment
CN112464212A (en) * 2020-03-30 2021-03-09 上海汇招信息技术有限公司 Data authority control reconstruction method based on mature complex service system
CN111737717A (en) * 2020-06-28 2020-10-02 深信服科技股份有限公司 Authority management and control method, system, equipment and computer readable storage medium
CN111737717B (en) * 2020-06-28 2024-04-09 深信服科技股份有限公司 Authority management and control method, system, equipment and computer readable storage medium
CN111783050A (en) * 2020-07-02 2020-10-16 浪潮云信息技术股份公司 Role and authority control system of website user
CN112036888A (en) * 2020-08-05 2020-12-04 北京文思海辉金信软件有限公司 Business operation execution method and device, computer equipment and storage medium
CN112287308A (en) * 2020-10-23 2021-01-29 深圳云之家网络有限公司 Service role authentication method and related device
CN112417402B (en) * 2020-11-27 2024-04-12 亿企赢网络科技有限公司 Authority control method, authority control device, authority control equipment and storage medium
CN112417402A (en) * 2020-11-27 2021-02-26 亿企赢网络科技有限公司 Authority control method, authority control device and storage medium
CN112738100A (en) * 2020-12-29 2021-04-30 北京天融信网络安全技术有限公司 Authentication method, device, authentication equipment and authentication system for data access
CN112738100B (en) * 2020-12-29 2023-09-01 北京天融信网络安全技术有限公司 Authentication method, device, authentication equipment and authentication system for data access
CN113032749A (en) * 2021-03-03 2021-06-25 北京读我网络技术有限公司 Synchronous authentication method and device
CN112965901B (en) * 2021-03-05 2023-08-01 北京百度网讯科技有限公司 API testing method, server, system and electronic equipment
CN112965901A (en) * 2021-03-05 2021-06-15 北京百度网讯科技有限公司 API testing method, server, system and electronic equipment
CN113343273A (en) * 2021-06-30 2021-09-03 重庆渝高科技产业(集团)股份有限公司 User login method, first server and computer readable storage medium
CN113589986B (en) * 2021-07-30 2024-02-27 上海公装无忧装饰工程有限公司 Business process management method, system, electronic equipment and storage medium
CN113589986A (en) * 2021-07-30 2021-11-02 上海公装无忧装饰工程有限公司 Business process management method, system, electronic device and storage medium
CN113641971A (en) * 2021-08-20 2021-11-12 武汉极意网络科技有限公司 Exception handling system based on behavior verification
CN113765676A (en) * 2021-09-18 2021-12-07 平安国际智慧城市科技股份有限公司 Interface access control method based on multiple user identities and related equipment
CN113765676B (en) * 2021-09-18 2024-05-24 平安国际智慧城市科技股份有限公司 Interface access control method based on multiple identities of user and related equipment
CN114417283A (en) * 2022-01-21 2022-04-29 芜湖雄狮汽车科技有限公司 Authority matching method and device for Internet of vehicles users, client and storage medium
CN115242474A (en) * 2022-07-14 2022-10-25 观澜网络(杭州)有限公司 Real-time communication system, method, terminal equipment and storage medium
CN115242474B (en) * 2022-07-14 2024-06-07 观澜网络(杭州)有限公司 Real-time communication system, method, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107277038A (en) Access control method, device and system
US11005779B2 (en) Method of and server for detecting associated web resources
CN111600856B (en) Safety system of operation and maintenance of data center
CN112597472B (en) Single sign-on method, device and storage medium
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
EP3417590B1 (en) Phishing attack detection and mitigation
WO2018188558A1 (en) Method and apparatus for identifying account permission
CN101626369B (en) Method, device and system for single sign-on
CN108701309A (en) A kind of distributed user profile authentication system for security of e-commerce transactions
CN107948203A (en) A kind of container login method, application server, system and storage medium
US8818906B1 (en) Systems and methods for performing authentication of a customer interacting with a banking platform
WO2013028794A2 (en) Multi-factor identity fingerprinting with user behavior
CN104660562A (en) Method, related device and system for information viewing
CN104168339A (en) Method and device for preventing domain name from being intercepted
CN111988295A (en) Database auditing method and device, WEB server, database auditing system and storage medium
CN106790085B (en) Vulnerability scanning method, device and system
CN111510463B (en) Abnormal behavior recognition system
CN113497786B (en) Evidence collection and tracing method, device and storage medium
CN112118238B (en) Method, device, system, equipment and storage medium for authenticating login
CN112995227B (en) One-stop information service platform based on three-party credit management
CN107438054A (en) The method and system of menu information control are realized based on public platform
CN114745145A (en) Business data access method, device and equipment and computer storage medium
CN105933356A (en) Method and device for detecting DNS (Domain Name System) hijacking of client
CN111385293A (en) Network risk detection method and device
CN107231365A (en) The method and server and fire wall of a kind of evidence obtaining

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20200721