CN107277076B - Network authority authentication method and device - Google Patents
Network authority authentication method and device Download PDFInfo
- Publication number
- CN107277076B CN107277076B CN201710720018.2A CN201710720018A CN107277076B CN 107277076 B CN107277076 B CN 107277076B CN 201710720018 A CN201710720018 A CN 201710720018A CN 107277076 B CN107277076 B CN 107277076B
- Authority
- CN
- China
- Prior art keywords
- access address
- network
- user
- authority
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention provides a method and a device for authenticating network authority, which relate to the field of information processing, and the method comprises the following steps: obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have the first network authority, judging whether the user has a second network authority; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter enabling the second access address to access, and the second access address comprises the content of the first access address. The technical problems that in the prior art, the authority authentication method is inconvenient to use, the authentication process is complicated, and the legal user service cannot normally use resources are solved. The user can automatically jump to the authentication interface, and the user can automatically jump to the resource interface after the authentication is finished. The user uses the simple and smooth technical effect.
Description
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to a method and an apparatus for authenticating a network permission.
Background
In the field of internet services, particularly in the field of document services, a user often needs to perform identity authentication on the user when accessing a specific resource, and different resource providers have different authentication modes and authentication entries for the user.
Traditional publishers provide IP that can automatically identify users for authentication, and users in the IP range can be authenticated using mailboxes.
However, the authority authentication method in the prior art is inconvenient to use, and a user cannot clearly remember the authentication process. Resulting in the failure of legitimate user services to use resources normally.
Disclosure of Invention
The embodiment of the invention provides a method and a device for authenticating network authority, which solve the problems that the authority authentication method in the prior art is inconvenient to use and the authentication process is complicated. Leading to the technical problem that the legal user service can not use the resources normally.
In view of the foregoing problems, embodiments of the present application are provided to provide a method and an apparatus for authenticating a network authority.
In a first aspect, the present invention provides a method for authenticating a network authority, where the method includes: obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address.
Preferably, the method further comprises: obtaining a first publisher according to the first access address, wherein the authority of the content of the first access address belongs to the first publisher; a first parameter is obtained from the first publisher.
Preferably, the first parameter further includes: obtaining a verification means of the first publisher.
Preferably, the method further comprises: and if the user has first network authority, the user obtains the content of the first access address.
Preferably, the method further comprises: and if the user does not have the second network authority, the user cannot obtain the content of the second model essay address.
In a second aspect, the present invention provides an apparatus for authenticating a network authority, the apparatus comprising:
a first obtaining unit, configured to obtain a first access address to be accessed by a user, where the first access address needs a first network permission;
the first judging unit is used for judging whether the user has a first network authority or not;
a second determination unit, configured to determine whether the user has a second network right if the user does not have a first network right, where the first network right is different from the second network right;
a second obtaining unit, configured to obtain a second access address according to the first access address if the user has a second network right, where the second access address includes a first parameter, where the first parameter enables access by the second access address, and the second access address includes content of the first access address.
Preferably, the apparatus further comprises:
a third obtaining unit, configured to obtain a first publisher according to the first access address, where a right of a content of the first access address belongs to the first publisher;
a fourth obtaining unit to obtain the first parameter according to the first publisher.
Preferably, the first parameter further includes:
a fifth obtaining unit configured to obtain an authentication method of the first publisher.
Preferably, the apparatus further comprises:
a sixth obtaining unit, configured to obtain, by the user, content of the first access address if the user has a first network right.
Preferably, the apparatus further comprises:
a seventh obtaining unit, configured to, if the user does not have the second network right, disable the user to obtain the content of the second paradigm address.
In a third aspect, the present invention provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of: obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address.
In a fourth aspect, the present invention provides an apparatus for authenticating a network authority, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the following steps: obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
1. according to the authentication method and device for the network authority, a first access address to be accessed by a user is obtained, and the first access address needs the first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address. The method solves the problems that the authority authentication method in the prior art is inconvenient to use and the authentication process is complicated. Leading to the technical problem that the legal user service can not use the resources normally. The user can automatically jump to the authentication interface, and the user can automatically jump to the resource interface after the authentication is finished. The user uses the simple and smooth technical effect.
2. The method comprises the steps that a first publisher is obtained according to a first access address, wherein the authority of the content of the first access address belongs to the first publisher; and obtaining a first parameter according to the first publisher, wherein the first parameter further comprises a verification mode of obtaining the first publisher. Further, the problems that the permission authentication method in the prior art is inconvenient to use and the authentication process is complicated are solved. Leading to the technical problem that the legal user service can not use the resources normally. The technical effects that the authentication mode of the first publisher is directly provided for the user, so that the user can directly perform identity authentication, a complicated switching and searching process is omitted, a legal user with an IP address not in the first access address mechanism can conveniently and efficiently access the required resource address, and resources are normally used are further achieved.
3. According to the embodiment of the application, if the user does not have the second network authority, the user cannot obtain the content of the second model essay address. The technical effect of protecting resources from being stolen by illegal users is achieved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Fig. 1 is a schematic flowchart illustrating a method for authenticating network permissions according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of an apparatus for authenticating network permissions according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of another network right authentication apparatus according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method and a device for authenticating network authority, which are used for solving the problems that an authority authentication method in the prior art is inconvenient to use and complicated in authentication process. Leading to the technical problem that the legal user service can not use the resources normally. The technical scheme provided by the invention has the following general idea:
in the technical scheme of the embodiment of the invention, a first access address to be accessed by a user is obtained, wherein the first access address needs a first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address. The method solves the problems that the authority authentication method in the prior art is inconvenient to use and the authentication process is complicated. Leading to the technical problem that the legal user service can not use the resources normally. The user can automatically jump to the authentication interface, and the user can automatically jump to the resource interface after the authentication is finished. The user uses the simple and smooth technical effect.
The technical solutions of the present invention are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present invention are described in detail in the technical solutions of the present application, and are not limited to the technical solutions of the present application, and the technical features in the embodiments and examples of the present application may be combined with each other without conflict.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Example one
Fig. 1 is a flowchart illustrating a method for authenticating a network permission according to an embodiment of the present invention. As shown in fig. 1, the method includes:
step 110, obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority;
specifically, the first access address is an access address having a specific resource and requiring authentication of a user, such as a website like a chinese unknown network, a database of all parties, a wipu, and the like, and the first network authority specifically refers to an IP address having a mechanism in the first access address. That is, access to the first access address is only possible if the user's IP address is within the first access address authority.
Step 120, determining whether the user has a first network right;
further, if the user has a first network right, the user obtains the content of the first access address.
Specifically, after the first access address is obtained, if the user wants to access the first access address, it needs to first determine whether the user has the first network authority, that is, determine whether the IP address of the user is in the mechanism of the first access address, if the user has the first network authority, the user can smoothly access the first access address, but the IP addresses of most users are not in the mechanism of the first access address, and in the prior art, for the user without the first network authority, cumbersome authentication is needed to be performed to successfully access the first access address.
Step 130, if the user does not have a first network authority, determining whether the user has a second network authority, wherein the first network authority is different from the second network authority;
specifically, for a user without the first network permission, that is, the IP address of the user is not in the organization of the first access address, the identity authentication may be performed by determining whether the user has a second network permission, where the second network permission is other network permissions different from the first network permission, and the second network permission may be a mailbox address, a mobile phone number, a micro signal code, or other social platform accounts.
Step 140, if the user has a second network right, obtaining a second access address according to the first access address, wherein the second access address includes a first parameter, wherein the first parameter enables the second access address to access, and the second access address includes the content of the first access address.
Specifically, if the user selects to use the second network right for verification, i.e. if the user selects to use mailbox, mobile phone number, etc. for verification, the second access address is obtained according to the first access address, the second access address is the other access address with all the content in the first access address, in other words, the content of the second access address is the same as the content of the first access address, meanwhile, the second access address also has the first parameter, which is the final authentication mode of the user accessing the second access address, in other words, when the user is verified by using a mailbox or a mobile phone number and the like, the second access address can automatically open an authentication page with the first parameter, and when the user authentication is completed, automatically jumping to a resource page which needs to be accessed by the user.
Further, a first publisher is obtained according to the first access address, wherein the authority of the content of the first access address belongs to the first publisher; a first parameter is obtained from the first publisher. The first parameter further includes: obtaining a verification means of the first publisher.
Specifically, the content right of the first access address belongs to the first publisher, so that the first publisher is obtained through the first access address, and the first publisher authentication mode, that is, the first parameter, is obtained. For example, if a user wants to access an electronic version of a reader magazine, the content right of the reader magazine belongs to the Gansu people publishing company, the Gansu people publishing company has an internal verification mode for the electronic version of the reader magazine, and if the user wants to access other content, the other content belongs to another publishing company, the verification mode of the publishing company is different from the verification mode of the Gansu people publishing company, in this case, the prior art summarizes the verification modes of different publishing companies, the user needs to perform switching search, the user cannot clearly remember the authentication flow, and the process is complicated, so that the application directly provides the verification mode of the first publishing company to the user through the second access address with the first parameter, so that the user can directly perform identity verification, thereby omitting the complicated flow of switching search, and achieving the purpose that a legal user whose IP address is not in the first access address mechanism can conveniently and quickly access the second access address with the first parameter, The required resource address is efficiently accessed, and the resources are normally used.
Further, if the user does not have the second network right, the user cannot obtain the content of the second access address.
Specifically, in order to provide convenience for a legal user and protect resources from being stolen by an illegal user, if the user does not have the second network right, that is, if the user does not use a device such as a mailbox or a mobile phone number which can prove identity to verify, the resource content of the second access address cannot be obtained.
Example 2
Based on the same inventive concept as the network authority authentication method in the foregoing embodiment, the present invention further provides an authentication apparatus for network authority, as shown in fig. 2, including:
a first obtaining unit 11, where the first obtaining unit 11 is configured to obtain a first access address to be accessed by a user, where the first access address needs a first network authority;
a first judging unit 12, where the first judging unit 12 is used to judge whether the user has a first network authority;
a second judging unit 13, configured to judge whether the user has a second network right if the user does not have a first network right, where the first network right is different from the second network right;
a second obtaining unit 14, where the second obtaining unit 14 is configured to obtain a second access address according to the first access address if the user has a second network right, where the second access address includes a first parameter, where the first parameter enables access by the second access address, and the second access address includes content of the first access address.
Preferably, the apparatus further comprises:
a third obtaining unit, configured to obtain a first publisher according to the first access address, where a right of a content of the first access address belongs to the first publisher;
a fourth obtaining unit to obtain the first parameter according to the first publisher.
Preferably, the first parameter further includes:
a fifth obtaining unit configured to obtain an authentication method of the first publisher.
Preferably, the apparatus further comprises:
a sixth obtaining unit, configured to obtain, by the user, content of the first access address if the user has a first network right.
Preferably, the apparatus further comprises:
a seventh obtaining unit, configured to, if the user does not have the second network right, disable the user to obtain the content of the second paradigm address.
Various changes and specific examples of the network right authentication method in embodiment 1 of fig. 1 are also applicable to the network right authentication device in this embodiment, and those skilled in the art can clearly know the implementation method of the network right authentication device in this embodiment through the foregoing detailed description of the network right authentication method, so for the sake of brevity of the description, detailed descriptions are not repeated here.
Example 3
Based on the same inventive concept as the authentication method of a network authority in the foregoing embodiments, the present invention also provides a computer-readable storage medium having stored thereon a computer program that, when being executed by a processor, implements the steps of any one of the foregoing authentication methods of a network authority.
Where in fig. 3 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other apparatus over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
1. according to the authentication method and device for the network authority, a first access address to be accessed by a user is obtained, and the first access address needs the first network authority; judging whether the user has a first network authority; if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission; and if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address. The method solves the problems that the authority authentication method in the prior art is inconvenient to use and the authentication process is complicated. Leading to the technical problem that the legal user service can not use the resources normally. The user can automatically jump to the authentication interface, and the user can automatically jump to the resource interface after the authentication is finished. The user uses the simple and smooth technical effect.
2. The method comprises the steps that a first publisher is obtained according to a first access address, wherein the authority of the content of the first access address belongs to the first publisher; and obtaining a first parameter according to the first publisher, wherein the first parameter further comprises a verification mode of obtaining the first publisher. Further, the problems that the permission authentication method in the prior art is inconvenient to use and the authentication process is complicated are solved. Leading to the technical problem that the legal user service can not use the resources normally. The technical effects that the authentication mode of the first publisher is directly provided for the user, so that the user can directly perform identity authentication, a complicated switching and searching process is omitted, a legal user with an IP address not in the first access address mechanism can conveniently and efficiently access the required resource address, and resources are normally used are further achieved.
3. According to the embodiment of the application, if the user does not have the second network authority, the user cannot obtain the content of the second model essay address. The technical effect of protecting resources from being stolen by illegal users is achieved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (8)
1. A method for authenticating network privileges, the method comprising:
obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority;
judging whether the user has a first network authority;
if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission;
if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address;
the first network permission is an IP address having a value within the first access address authority; the second network authority comprises a mailbox address, a mobile phone number, a micro signal code or other social platform account numbers.
2. The method of claim 1, wherein the method further comprises:
obtaining a first publisher according to the first access address, wherein the authority of the content of the first access address belongs to the first publisher;
a first parameter is obtained from the first publisher.
3. The method of claim 1, wherein the first parameter further comprises:
a verification means of the first publisher is obtained.
4. The method of claim 1, wherein the method further comprises: and if the user has first network authority, the user obtains the content of the first access address.
5. The method of claim 1, wherein the method further comprises: and if the user does not have the second network right, the user cannot obtain the content of the second model essay address.
6. An apparatus for authenticating a network authority, the apparatus comprising:
a first obtaining unit, configured to obtain a first access address to be accessed by a user, where the first access address needs a first network permission;
the first judging unit is used for judging whether the user has a first network authority or not;
a second determination unit, configured to determine whether the user has a second network right if the user does not have a first network right, where the first network right is different from the second network right;
a second obtaining unit, configured to obtain a second access address according to the first access address if the user has a second network right, where the second access address includes a first parameter, where the first parameter enables access by the second access address, and the second access address includes content of the first access address;
the first network permission is an IP address having a value within the first access address authority; the second network authority comprises a mailbox address, a mobile phone number, a micro signal code or other social platform account numbers.
7. A computer-readable storage medium, on which a computer program is stored, which program, when executed by a processor, carries out the steps of:
obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority;
judging whether the user has a first network authority;
if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission;
if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address;
the first network permission is an IP address having a value within the first access address authority; the second network authority comprises a mailbox address, a mobile phone number, a micro signal code or other social platform account numbers.
8. An apparatus for authenticating network privileges, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the steps of:
obtaining a first access address to be accessed by a user, wherein the first access address needs a first network authority;
judging whether the user has a first network authority;
if the user does not have a first network permission, determining whether the user has a second network permission, wherein the first network permission is different from the second network permission;
if the user has a second network authority, obtaining a second access address according to the first access address, wherein the second access address comprises a first parameter, the first parameter enables the second access address to access, and the second access address comprises the content of the first access address;
the first network permission is an IP address having a value within the first access address authority; the second network authority comprises a mailbox address, a mobile phone number, a micro signal code or other social platform account numbers.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710720018.2A CN107277076B (en) | 2017-08-21 | 2017-08-21 | Network authority authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710720018.2A CN107277076B (en) | 2017-08-21 | 2017-08-21 | Network authority authentication method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107277076A CN107277076A (en) | 2017-10-20 |
CN107277076B true CN107277076B (en) | 2020-07-14 |
Family
ID=60076357
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710720018.2A Active CN107277076B (en) | 2017-08-21 | 2017-08-21 | Network authority authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107277076B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101458797A (en) * | 2008-12-22 | 2009-06-17 | 腾讯科技(深圳)有限公司 | Transaction system and method |
CN103618652A (en) * | 2013-12-17 | 2014-03-05 | 沈阳觉醒软件有限公司 | Audit and depth analysis system and audit and depth analysis method of business data |
CN103701783A (en) * | 2013-12-17 | 2014-04-02 | 沈阳觉醒软件有限公司 | Preprocessing unit, data processing system consisting of same, and processing method |
CN103906063A (en) * | 2012-12-29 | 2014-07-02 | 中国移动通信集团福建有限公司 | Terminal WLAN authentication method and terminal |
CN106302303A (en) * | 2015-05-11 | 2017-01-04 | 林友哲 | A kind of for across application user profile transmission log in agreement operation method |
CN106657052A (en) * | 2016-12-16 | 2017-05-10 | 湖南国科微电子股份有限公司 | Access management method and system for storage data |
CN106850636A (en) * | 2017-02-13 | 2017-06-13 | 深圳市沃特沃德股份有限公司 | A kind of authority acquiring method, authority opening method, terminal and server |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130151411A1 (en) * | 2011-12-09 | 2013-06-13 | Worldpasskey, Inc. | Digital authentication and security method and system |
-
2017
- 2017-08-21 CN CN201710720018.2A patent/CN107277076B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101458797A (en) * | 2008-12-22 | 2009-06-17 | 腾讯科技(深圳)有限公司 | Transaction system and method |
CN103906063A (en) * | 2012-12-29 | 2014-07-02 | 中国移动通信集团福建有限公司 | Terminal WLAN authentication method and terminal |
CN103618652A (en) * | 2013-12-17 | 2014-03-05 | 沈阳觉醒软件有限公司 | Audit and depth analysis system and audit and depth analysis method of business data |
CN103701783A (en) * | 2013-12-17 | 2014-04-02 | 沈阳觉醒软件有限公司 | Preprocessing unit, data processing system consisting of same, and processing method |
CN106302303A (en) * | 2015-05-11 | 2017-01-04 | 林友哲 | A kind of for across application user profile transmission log in agreement operation method |
CN106657052A (en) * | 2016-12-16 | 2017-05-10 | 湖南国科微电子股份有限公司 | Access management method and system for storage data |
CN106850636A (en) * | 2017-02-13 | 2017-06-13 | 深圳市沃特沃德股份有限公司 | A kind of authority acquiring method, authority opening method, terminal and server |
Also Published As
Publication number | Publication date |
---|---|
CN107277076A (en) | 2017-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323260B2 (en) | Method and device for identity verification | |
CN109510849B (en) | Cloud-storage account authentication method and device | |
US20190081935A1 (en) | Location-enforced data management in complex multi-region computing | |
US8590003B2 (en) | Controlling access to resources by hosted entities | |
US8590052B2 (en) | Enabling granular discretionary access control for data stored in a cloud computing environment | |
US9098675B1 (en) | Authorized delegation of permissions | |
CN105592011B (en) | Account login method and device | |
CN109889517B (en) | Data processing method, permission data set creating device and electronic equipment | |
US20160232374A1 (en) | Permission control method and apparatus | |
US9647993B2 (en) | Multi-repository key storage and selection | |
US20140215558A1 (en) | Establishment of a trust index to enable connections from unknown devices | |
US9934310B2 (en) | Determining repeat website users via browser uniqueness tracking | |
CN104753677B (en) | Password hierarchical control method and system | |
US20190020476A1 (en) | User-directed identity verification over a network | |
CN110138767B (en) | Transaction request processing method, device, equipment and storage medium | |
CN108769070A (en) | One kind is gone beyond one's commission leak detection method and device | |
CN111177741A (en) | Pre-authorization data access method and device based on enterprise browser | |
US9026456B2 (en) | Business-responsibility-centric identity management | |
CN106951795A (en) | A kind of application data access partition method and device | |
KR20160018554A (en) | Roaming internet-accessible application state across trusted and untrusted platforms | |
CN115238247A (en) | Data processing method based on zero trust data access control system | |
CN111090616B (en) | File management method, corresponding device, equipment and storage medium | |
CN111310137B (en) | Block chain associated data evidence storing method and device and electronic equipment | |
CN107623662B (en) | Access control method, device and system | |
EP3286892B1 (en) | System and method for associating related digital assets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |