CN107277076B - Network authority authentication method and device - Google Patents

Network authority authentication method and device Download PDF

Info

Publication number
CN107277076B
CN107277076B CN201710720018.2A CN201710720018A CN107277076B CN 107277076 B CN107277076 B CN 107277076B CN 201710720018 A CN201710720018 A CN 201710720018A CN 107277076 B CN107277076 B CN 107277076B
Authority
CN
China
Prior art keywords
access address
network
user
authority
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710720018.2A
Other languages
Chinese (zh)
Other versions
CN107277076A (en
Inventor
师洪波
钱力
谢靖
黄向阳
李涵昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Science Library Chinese Academy Of Sciences
Original Assignee
National Science Library Chinese Academy Of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Science Library Chinese Academy Of Sciences filed Critical National Science Library Chinese Academy Of Sciences
Priority to CN201710720018.2A priority Critical patent/CN107277076B/en
Publication of CN107277076A publication Critical patent/CN107277076A/en
Application granted granted Critical
Publication of CN107277076B publication Critical patent/CN107277076B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a method and a device for authenticating network authority, which relate to the field of information processing, and the method comprises the following steps: obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have the first network authority, judging whether the user has a second network authority; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter enabling the second access address to access, and the second access address comprises the content of the first access address. The technical problems that in the prior art, the authority authentication method is inconvenient to use, the authentication process is complicated, and the legal user service cannot normally use resources are solved. The user can automatically jump to the authentication interface, and the user can automatically jump to the resource interface after the authentication is finished. The user uses the simple and smooth technical effect.

Description

Network authority authentication method and device
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to a method and an apparatus for authenticating a network permission.
Background
In the field of internet services, particularly in the field of document services, a user often needs to perform identity authentication on the user when accessing a specific resource, and different resource providers have different authentication modes and authentication entries for the user.
Traditional publishers provide IP that can automatically identify users for authentication, and users in the IP range can be authenticated using mailboxes.
However, the authority authentication method in the prior art is inconvenient to use, and a user cannot clearly remember the authentication process. Resulting in the failure of legitimate user services to use resources normally.
Disclosure of Invention
The embodiment of the invention provides a method and a device for authenticating network authority, which solve the problems that the authority authentication method in the prior art is inconvenient to use and the authentication process is complicated. Leading to the technical problem that the legal user service can not use the resources normally.
In view of the foregoing problems, embodiments of the present application are provided to provide a method and an apparatus for authenticating a network authority.
In a first aspect, the present invention provides a method for authenticating a network authority, where the method includes: obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address.
Preferably, the method further comprises: obtaining a first publisher according to the first access address, wherein the authority of the content of the first access address belongs to the first publisher; a first parameter is obtained from the first publisher.
Preferably, the first parameter further includes: obtaining a verification means of the first publisher.
Preferably, the method further comprises: and if the user has first network authority, the user obtains the content of the first access address.
Preferably, the method further comprises: and if the user does not have the second network authority, the user cannot obtain the content of the second model essay address.
In a second aspect, the present invention provides an apparatus for authenticating a network authority, the apparatus comprising:
a first obtaining unit, configured to obtain a first access address to be accessed by a user, where the first access address needs a first network permission;
the first judging unit is used for judging whether the user has a first network authority or not;
a second determination unit, configured to determine whether the user has a second network right if the user does not have a first network right, where the first network right is different from the second network right;
a second obtaining unit, configured to obtain a second access address according to the first access address if the user has a second network right, where the second access address includes a first parameter, where the first parameter enables access by the second access address, and the second access address includes content of the first access address.
Preferably, the apparatus further comprises:
a third obtaining unit, configured to obtain a first publisher according to the first access address, where a right of a content of the first access address belongs to the first publisher;
a fourth obtaining unit to obtain the first parameter according to the first publisher.
Preferably, the first parameter further includes:
a fifth obtaining unit configured to obtain an authentication method of the first publisher.
Preferably, the apparatus further comprises:
a sixth obtaining unit, configured to obtain, by the user, content of the first access address if the user has a first network right.
Preferably, the apparatus further comprises:
a seventh obtaining unit, configured to, if the user does not have the second network right, disable the user to obtain the content of the second paradigm address.
In a third aspect, the present invention provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of: obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address.
In a fourth aspect, the present invention provides an apparatus for authenticating a network authority, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the following steps: obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
1. according to the authentication method and device for the network authority, a first access address to be accessed by a user is obtained, and the first access address needs the first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address. The method solves the problems that the authority authentication method in the prior art is inconvenient to use and the authentication process is complicated. Leading to the technical problem that the legal user service can not use the resources normally. The user can automatically jump to the authentication interface, and the user can automatically jump to the resource interface after the authentication is finished. The user uses the simple and smooth technical effect.
2. The method comprises the steps that a first publisher is obtained according to a first access address, wherein the authority of the content of the first access address belongs to the first publisher; and obtaining a first parameter according to the first publisher, wherein the first parameter further comprises a verification mode of obtaining the first publisher. Further, the problems that the permission authentication method in the prior art is inconvenient to use and the authentication process is complicated are solved. Leading to the technical problem that the legal user service can not use the resources normally. The technical effects that the authentication mode of the first publisher is directly provided for the user, so that the user can directly perform identity authentication, a complicated switching and searching process is omitted, a legal user with an IP address not in the first access address mechanism can conveniently and efficiently access the required resource address, and resources are normally used are further achieved.
3. According to the embodiment of the application, if the user does not have the second network authority, the user cannot obtain the content of the second model essay address. The technical effect of protecting resources from being stolen by illegal users is achieved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Fig. 1 is a schematic flowchart illustrating a method for authenticating network permissions according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of an apparatus for authenticating network permissions according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of another network right authentication apparatus according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method and a device for authenticating network authority, which are used for solving the problems that an authority authentication method in the prior art is inconvenient to use and complicated in authentication process. Leading to the technical problem that the legal user service can not use the resources normally. The technical scheme provided by the invention has the following general idea:
in the technical scheme of the embodiment of the invention, a first access address to be accessed by a user is obtained, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address. The method solves the problems that the authority authentication method in the prior art is inconvenient to use and the authentication process is complicated. Leading to the technical problem that the legal user service can not use the resources normally. The user can automatically jump to the authentication interface, and the user can automatically jump to the resource interface after the authentication is finished. The user uses the simple and smooth technical effect.
The technical solutions of the present invention are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present invention are described in detail in the technical solutions of the present application, and are not limited to the technical solutions of the present application, and the technical features in the embodiments and examples of the present application may be combined with each other without conflict.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Example one
Fig. 1 is a flowchart illustrating a method for authenticating a network permission according to an embodiment of the present invention. As shown in fig. 1, the method includes:
step 110, obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority;
specifically, the first access address is an access address having a specific resource and requiring authentication of a user, such as a website like a chinese unknown network, a database of all parties, a wipu, and the like, and the first network authority specifically refers to an IP address having a mechanism in the first access address. That is, access to the first access address is only possible if the user's IP address is within the first access address authority.
Step 120, determining whether the user has a first network right;
further, if the user has a first network right, the user obtains the content of the first access address.
Specifically, after the first access address is obtained, if the user wants to access the first access address, it needs to first determine whether the user has the first network authority, that is, determine whether the IP address of the user is in the mechanism of the first access address, if the user has the first network authority, the user can smoothly access the first access address, but the IP addresses of most users are not in the mechanism of the first access address, and in the prior art, for the user without the first network authority, cumbersome authentication is needed to be performed to successfully access the first access address.
Step 130, if the user does not have a first network authority, determining whether the user has a second network authority, wherein the first network authority is different from the second network authority;
specifically, for a user without the first network permission, that is, the IP address of the user is not in the organization of the first access address, the identity authentication may be performed by determining whether the user has a second network permission, where the second network permission is other network permissions different from the first network permission, and the second network permission may be a mailbox address, a mobile phone number, a micro signal code, or other social platform accounts.
Step 140, if the user has a second network right, obtaining a second access address according to the first access address, wherein the second access address includes a first parameter, wherein the first parameter enables the second access address to access, and the second access address includes the content of the first access address.
Specifically, if the user selects to use the second network right for verification, i.e. if the user selects to use mailbox, mobile phone number, etc. for verification, the second access address is obtained according to the first access address, the second access address is the other access address with all the content in the first access address, in other words, the content of the second access address is the same as the content of the first access address, meanwhile, the second access address also has the first parameter, which is the final authentication mode of the user accessing the second access address, in other words, when the user is verified by using a mailbox or a mobile phone number and the like, the second access address can automatically open an authentication page with the first parameter, and when the user authentication is completed, automatically jumping to a resource page which needs to be accessed by the user.
Further, a first publisher is obtained according to the first access address, wherein the authority of the content of the first access address belongs to the first publisher; a first parameter is obtained from the first publisher. The first parameter further includes: obtaining a verification means of the first publisher.
Specifically, the content right of the first access address belongs to the first publisher, so that the first publisher is obtained through the first access address, and the first publisher authentication mode, that is, the first parameter, is obtained. For example, if a user wants to access an electronic version of a reader magazine, the content right of the reader magazine belongs to the Gansu people publishing company, the Gansu people publishing company has an internal verification mode for the electronic version of the reader magazine, and if the user wants to access other content, the other content belongs to another publishing company, the verification mode of the publishing company is different from the verification mode of the Gansu people publishing company, in this case, the prior art summarizes the verification modes of different publishing companies, the user needs to perform switching search, the user cannot clearly remember the authentication flow, and the process is complicated, so that the application directly provides the verification mode of the first publishing company to the user through the second access address with the first parameter, so that the user can directly perform identity verification, thereby omitting the complicated flow of switching search, and achieving the purpose that a legal user whose IP address is not in the first access address mechanism can conveniently and quickly access the second access address with the first parameter, The required resource address is efficiently accessed, and the resources are normally used.
Further, if the user does not have the second network right, the user cannot obtain the content of the second access address.
Specifically, in order to provide convenience for a legal user and protect resources from being stolen by an illegal user, if the user does not have the second network right, that is, if the user does not use a device such as a mailbox or a mobile phone number which can prove identity to verify, the resource content of the second access address cannot be obtained.
Example 2
Based on the same inventive concept as the network authority authentication method in the foregoing embodiment, the present invention further provides an authentication apparatus for network authority, as shown in fig. 2, including:
a first obtaining unit 11, where the first obtaining unit 11 is configured to obtain a first access address to be accessed by a user, where the first access address needs a first network authority;
a first judging unit 12, where the first judging unit 12 is used to judge whether the user has a first network authority;
a second judging unit 13, configured to judge whether the user has a second network right if the user does not have a first network right, where the first network right is different from the second network right;
a second obtaining unit 14, where the second obtaining unit 14 is configured to obtain a second access address according to the first access address if the user has a second network right, where the second access address includes a first parameter, where the first parameter enables access by the second access address, and the second access address includes content of the first access address.
Preferably, the apparatus further comprises:
a third obtaining unit, configured to obtain a first publisher according to the first access address, where a right of a content of the first access address belongs to the first publisher;
a fourth obtaining unit to obtain the first parameter according to the first publisher.
Preferably, the first parameter further includes:
a fifth obtaining unit configured to obtain an authentication method of the first publisher.
Preferably, the apparatus further comprises:
a sixth obtaining unit, configured to obtain, by the user, content of the first access address if the user has a first network right.
Preferably, the apparatus further comprises:
a seventh obtaining unit, configured to, if the user does not have the second network right, disable the user to obtain the content of the second paradigm address.
Various changes and specific examples of the network right authentication method in embodiment 1 of fig. 1 are also applicable to the network right authentication device in this embodiment, and those skilled in the art can clearly know the implementation method of the network right authentication device in this embodiment through the foregoing detailed description of the network right authentication method, so for the sake of brevity of the description, detailed descriptions are not repeated here.
Example 3
Based on the same inventive concept as the authentication method of a network authority in the foregoing embodiments, the present invention also provides a computer-readable storage medium having stored thereon a computer program that, when being executed by a processor, implements the steps of any one of the foregoing authentication methods of a network authority.
Where in fig. 3 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other apparatus over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
1. according to the authentication method and device for the network authority, a first access address to be accessed by a user is obtained, and the first access address needs the first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address. The method solves the problems that the authority authentication method in the prior art is inconvenient to use and the authentication process is complicated. Leading to the technical problem that the legal user service can not use the resources normally. The user can automatically jump to the authentication interface, and the user can automatically jump to the resource interface after the authentication is finished. The user uses the simple and smooth technical effect.
2. The method comprises the steps that a first publisher is obtained according to a first access address, wherein the authority of the content of the first access address belongs to the first publisher; and obtaining a first parameter according to the first publisher, wherein the first parameter further comprises a verification mode of obtaining the first publisher. Further, the problems that the permission authentication method in the prior art is inconvenient to use and the authentication process is complicated are solved. Leading to the technical problem that the legal user service can not use the resources normally. The technical effects that the authentication mode of the first publisher is directly provided for the user, so that the user can directly perform identity authentication, a complicated switching and searching process is omitted, a legal user with an IP address not in the first access address mechanism can conveniently and efficiently access the required resource address, and resources are normally used are further achieved.
3. According to the embodiment of the application, if the user does not have the second network authority, the user cannot obtain the content of the second model essay address. The technical effect of protecting resources from being stolen by illegal users is achieved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (8)

1. A method for authenticating network privileges, the method comprising:
obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority;
judging whether the user has a first network authority;
if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission;
if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address;
the first network permission is an IP address having a value within the first access address authority; the second network authority comprises a mailbox address, a mobile phone number, a micro signal code or other social platform account numbers.
2. The method of claim 1, wherein the method further comprises:
obtaining a first publisher according to the first access address, wherein the authority of the content of the first access address belongs to the first publisher;
a first parameter is obtained from the first publisher.
3. The method of claim 1, wherein the first parameter further comprises:
a verification means of the first publisher is obtained.
4. The method of claim 1, wherein the method further comprises: and if the user has first network authority, the user obtains the content of the first access address.
5. The method of claim 1, wherein the method further comprises: and if the user does not have the second network right, the user cannot obtain the content of the second model essay address.
6. An apparatus for authenticating a network authority, the apparatus comprising:
a first obtaining unit, configured to obtain a first access address to be accessed by a user, where the first access address needs a first network permission;
the first judging unit is used for judging whether the user has a first network authority or not;
a second determination unit, configured to determine whether the user has a second network right if the user does not have a first network right, where the first network right is different from the second network right;
a second obtaining unit, configured to obtain a second access address according to the first access address if the user has a second network right, where the second access address includes a first parameter, where the first parameter enables access by the second access address, and the second access address includes content of the first access address;
the first network permission is an IP address having a value within the first access address authority; the second network authority comprises a mailbox address, a mobile phone number, a micro signal code or other social platform account numbers.
7. A computer-readable storage medium, on which a computer program is stored, which program, when executed by a processor, carries out the steps of:
obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority;
judging whether the user has a first network authority;
if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission;
if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address;
the first network permission is an IP address having a value within the first access address authority; the second network authority comprises a mailbox address, a mobile phone number, a micro signal code or other social platform account numbers.
8. An apparatus for authenticating network privileges, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the steps of:
obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority;
judging whether the user has a first network authority;
if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission;
if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address;
the first network permission is an IP address having a value within the first access address authority; the second network authority comprises a mailbox address, a mobile phone number, a micro signal code or other social platform account numbers.
CN201710720018.2A 2017-08-21 2017-08-21 Network authority authentication method and device Active CN107277076B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710720018.2A CN107277076B (en) 2017-08-21 2017-08-21 Network authority authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710720018.2A CN107277076B (en) 2017-08-21 2017-08-21 Network authority authentication method and device

Publications (2)

Publication Number Publication Date
CN107277076A CN107277076A (en) 2017-10-20
CN107277076B true CN107277076B (en) 2020-07-14

Family

ID=60076357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710720018.2A Active CN107277076B (en) 2017-08-21 2017-08-21 Network authority authentication method and device

Country Status (1)

Country Link
CN (1) CN107277076B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458797A (en) * 2008-12-22 2009-06-17 腾讯科技(深圳)有限公司 Transaction system and method
CN103618652A (en) * 2013-12-17 2014-03-05 沈阳觉醒软件有限公司 Audit and depth analysis system and audit and depth analysis method of business data
CN103701783A (en) * 2013-12-17 2014-04-02 沈阳觉醒软件有限公司 Preprocessing unit, data processing system consisting of same, and processing method
CN103906063A (en) * 2012-12-29 2014-07-02 中国移动通信集团福建有限公司 Terminal WLAN authentication method and terminal
CN106302303A (en) * 2015-05-11 2017-01-04 林友哲 A kind of for across application user profile transmission log in agreement operation method
CN106657052A (en) * 2016-12-16 2017-05-10 湖南国科微电子股份有限公司 Access management method and system for storage data
CN106850636A (en) * 2017-02-13 2017-06-13 深圳市沃特沃德股份有限公司 A kind of authority acquiring method, authority opening method, terminal and server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130151411A1 (en) * 2011-12-09 2013-06-13 Worldpasskey, Inc. Digital authentication and security method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458797A (en) * 2008-12-22 2009-06-17 腾讯科技(深圳)有限公司 Transaction system and method
CN103906063A (en) * 2012-12-29 2014-07-02 中国移动通信集团福建有限公司 Terminal WLAN authentication method and terminal
CN103618652A (en) * 2013-12-17 2014-03-05 沈阳觉醒软件有限公司 Audit and depth analysis system and audit and depth analysis method of business data
CN103701783A (en) * 2013-12-17 2014-04-02 沈阳觉醒软件有限公司 Preprocessing unit, data processing system consisting of same, and processing method
CN106302303A (en) * 2015-05-11 2017-01-04 林友哲 A kind of for across application user profile transmission log in agreement operation method
CN106657052A (en) * 2016-12-16 2017-05-10 湖南国科微电子股份有限公司 Access management method and system for storage data
CN106850636A (en) * 2017-02-13 2017-06-13 深圳市沃特沃德股份有限公司 A kind of authority acquiring method, authority opening method, terminal and server

Also Published As

Publication number Publication date
CN107277076A (en) 2017-10-20

Similar Documents

Publication Publication Date Title
US11323260B2 (en) Method and device for identity verification
CN109510849B (en) Cloud-storage account authentication method and device
US20190081935A1 (en) Location-enforced data management in complex multi-region computing
US8590003B2 (en) Controlling access to resources by hosted entities
US8590052B2 (en) Enabling granular discretionary access control for data stored in a cloud computing environment
US9098675B1 (en) Authorized delegation of permissions
CN105592011B (en) Account login method and device
CN109889517B (en) Data processing method, permission data set creating device and electronic equipment
US20160232374A1 (en) Permission control method and apparatus
US9647993B2 (en) Multi-repository key storage and selection
US20140215558A1 (en) Establishment of a trust index to enable connections from unknown devices
US9934310B2 (en) Determining repeat website users via browser uniqueness tracking
CN104753677B (en) Password hierarchical control method and system
US20190020476A1 (en) User-directed identity verification over a network
CN110138767B (en) Transaction request processing method, device, equipment and storage medium
CN108769070A (en) One kind is gone beyond one's commission leak detection method and device
CN111177741A (en) Pre-authorization data access method and device based on enterprise browser
US9026456B2 (en) Business-responsibility-centric identity management
CN106951795A (en) A kind of application data access partition method and device
KR20160018554A (en) Roaming internet-accessible application state across trusted and untrusted platforms
CN115238247A (en) Data processing method based on zero trust data access control system
CN111090616B (en) File management method, corresponding device, equipment and storage medium
CN111310137B (en) Block chain associated data evidence storing method and device and electronic equipment
CN107623662B (en) Access control method, device and system
EP3286892B1 (en) System and method for associating related digital assets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant