CN108090374A - A kind of multi User Privilege Management method and system - Google Patents

A kind of multi User Privilege Management method and system Download PDF

Info

Publication number
CN108090374A
CN108090374A CN201810019582.6A CN201810019582A CN108090374A CN 108090374 A CN108090374 A CN 108090374A CN 201810019582 A CN201810019582 A CN 201810019582A CN 108090374 A CN108090374 A CN 108090374A
Authority
CN
China
Prior art keywords
user
identity
password
permission
user name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810019582.6A
Other languages
Chinese (zh)
Inventor
陈少静
张大为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHUHAI MAIYUE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
ZHUHAI MAIYUE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHUHAI MAIYUE INFORMATION TECHNOLOGY Co Ltd filed Critical ZHUHAI MAIYUE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201810019582.6A priority Critical patent/CN108090374A/en
Publication of CN108090374A publication Critical patent/CN108090374A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a kind of multi User Privilege Management method and system, this method is used to test user name and whether password is correct;If so, according to the correspondence between user name and system identity, the corresponding identity of the user name is determined;Corresponding system permission is determined for the identity, and shows the corresponding display content of the system permission.It is achieved thereby that the more rights management different contents of multi-user; also the password of user is encrypted simultaneously; it is deposited in the form of ciphertext in the database; prevent the leakage of user password; different users is due to the difference of permission; so the content that can be browsed and the operation being managed are also different, this protects the content of other users to a certain extent, is also more favorable for managing and safeguard and has played the role of good security and confidentiality.

Description

A kind of multi User Privilege Management method and system
Technical field
This application involves system management technologies field more particularly to a kind of multi User Privilege Management method and system.
Background technology
With computer technology development at full speed and the expansion of application field, particularly computer network and e-commerce Development, greatly change the management mode of account management, can be provided for client conveniently, fast, safe service.
But most customer account management management (English:Customer Relationship Management, referred to as: CRM) system is all single user management, but also cannot browse and manage different contents, so relatively simple, and User password is also plaintext, it is easy to reveal, some contents can only administrator see, and other user it can also be seen that Cause security, confidentiality bad, be unfavorable for managing to a certain extent, nor beneficial to maintenance.
The content of the invention
The present invention provides a kind of multi User Privilege Management method and system, to solve crm system power in the prior art It is single to limit way to manage, and there are problems that security.
Its specific technical solution is as follows:
A kind of multi User Privilege Management method, the described method includes:
When getting user name input by user and password, verify whether the user name and password are correct;
If so, according to the correspondence between user name and system identity, the corresponding identity of the user name is determined;
Corresponding system permission is determined for the identity, and shows the corresponding display content of the system permission.
Optionally, determine corresponding system permission for the identity, and show the corresponding display content of the system permission, Including:
Whether it is the identity distribution system permission in decision-making system in the corresponding identity of definite user name;
If unallocated system permission then shows the page without any content;
If distribution system permission, then the corresponding display content of the system permission is shown in the page.
Optionally, the method further includes:
User name input by user and password are being got, password input by user is being carried out by Advanced Encryption Standard Encryption;
And encrypted password is stored in the database in the form of ciphertext.
Optionally, after the corresponding display content of the system permission is shown, the method further includes:
Detect whether the instruction for being added and binding to active coding there are user;
If in the presence of the active coding of addition or user bound input.
Optionally, after the corresponding display content of the system permission is shown, the method further includes:
Obtain the instruction for transferring system log;
According to described instruction, the corresponding system log of the user is transferred out, and shows the system log.
A kind of multi User Privilege Management system, the system comprises:
Authentication module, for when getting user name input by user and password, verifying the user name and close Whether code is correct;
Processing module during for when being verified, getting user name input by user and password, verifies the use Whether name in an account book and password are correct;
Optionally, the processing module, specifically in the corresponding identity of definite user name, in decision-making system whether be The identity distribution system permission;If unallocated system permission then shows the page without any content;If distribution system is weighed Limit, then show the corresponding display content of the system permission in the page.
Optionally, the processing module is additionally operable to getting user name input by user and password, and user is inputted Password be encrypted by Advanced Encryption Standard;And encrypted password is stored in the database in the form of ciphertext.
Optionally, the processing module is additionally operable to detect whether what is be added active coding there are user and bind Instruction;If in the presence of the active coding of addition or user bound input.
Optionally, the processing module is additionally operable to obtain the instruction for transferring system log;According to described instruction, transfer out The corresponding system log of the user, and show the system log.
By scheme provided by the present invention, system verifies whether the user name and password are correct;If so, according to Correspondence between user name and system identity determines the corresponding identity of user name;Corresponding system is determined for the identity Permission, and show the corresponding display content of the system permission.It is achieved thereby that the more rights management different contents of multi-user, simultaneously Also the password of user is encrypted, is deposited in the form of ciphertext in the database, it is therefore prevented that the leakage of user password, it is different User is due to the difference of permission, so the content that can be browsed and the operation being managed are also different, this is protected to a certain extent The content of other users has been protected, has also been more favorable for managing and safeguard and played the role of good security and confidentiality.
Description of the drawings
Fig. 1 is a kind of flow chart of multi User Privilege Management method in the embodiment of the present invention;
Fig. 2 is a kind of structure diagram of multi User Privilege Management system in the embodiment of the present invention.
Specific embodiment
Technical solution of the present invention is described in detail below by attached drawing and specific embodiment, it should be understood that this hair Particular technique feature in bright embodiment and embodiment is the explanation rather than restriction to technical solution of the present invention, not In the case of conflict, the particular technique feature in the embodiment of the present invention and embodiment can be mutually combined.
It is as shown in Figure 1 a kind of flow chart of multi User Privilege Management method in the embodiment of the present invention, this method includes:
S101 when getting user name input by user and password, verifies whether user name and password are accurate;
Within the system, user can input user name and password come login system by login interface.
After user name input by user and password is detected, system will test user name and password system Card.When being verified, system will perform S102, if user name and password authentification are obstructed out-of-date, perform S104.
Further, in embodiments of the present invention, in order to ensure the security of the password of user, which will input user Password be encrypted by Advanced Encryption Standard AES, then by encrypted password storage into database, by this way into After row encryption, the user password in system cannot be checked at will, so as to ensure that the security of user password.
S102 according to the correspondence between user name and system identity, determines the corresponding identity of user name;
In embodiments of the present invention, each user is managed for convenience, so in systems to each legal use An identity is all distributed at family, which determines the operation that user can perform in systems, so definite input by user After user name and password are legal, identity just is carried out to the user's name and is determined.
S103 determines corresponding system permission, and the corresponding display content of display system permission for the identity;
S104 prompts user to re-enter user name and password.
After the corresponding identity of definite the user, system will determine corresponding system permission according to identity.Specifically, Determine whether system is the identity distribution system permission, if having been allocated for system permission, then system is shown in the page first The corresponding display content of permission of uniting, if unallocated system permission, then shows the page without any content.
Briefly, permission is distributed for client, then the corresponding content of permission can be shown in the page, if not weighing Limit does not show any content then, so ensures the security of system for content.
Certainly, come except through permission outside display content, different contents can also be shown by switch operators. Corresponding operator is namely determined according to identity, so as to show different contents based on the difference of operator.
Further, in embodiments of the present invention, system can detect in real time user whether be active coding be added or Bindings, if be added the either instruction of binding to active coding there are user, then according to activation input by user Code is added and bindings.Except of course that outside addition and binding, user can also convert active coding, with And the operations such as active coding presence adjustment are carried out to active coding, it can so facilitate rapid and convenient pipe of the user to active coding Reason.
Further, in embodiments of the present invention, if user needs to transfer system log, acquisition is transferred system by system The instruction of daily record according to the instruction, transfers out the corresponding system log of the user, and show the system log so that it is convenient to System is investigated, and also makes system maintenance enhanced convenience quick.
By scheme provided by the present invention, system verifies whether the user name and password are correct;If so, according to Correspondence between user name and system identity determines the corresponding identity of user name;Corresponding system is determined for the identity Permission, and show the corresponding display content of the system permission.It is achieved thereby that the more rights management different contents of multi-user, simultaneously Also the password of user is encrypted, is deposited in the form of ciphertext in the database, it is therefore prevented that the leakage of user password, it is different User is due to the difference of permission, so the content that can be browsed and the operation being managed are also different, this is protected to a certain extent The content of other users has been protected, has also been more favorable for managing and safeguard and played the role of good security and confidentiality.
In addition, additionally providing a kind of multi User Privilege Management system in the embodiment of the present invention, it is illustrated in figure 2 of the invention real Applying a kind of structure diagram of multi User Privilege Management system, the system in example includes:
Authentication module 201, for when getting user name input by user and password, verify the user name and Whether password is correct;
Processing module 202, for when being verified, according to the correspondence between user name and system identity, determining The corresponding identity of the user name;Corresponding system permission is determined for the identity, and shows that the system permission is corresponding aobvious Show content.
Further, in embodiments of the present invention, the processing module 202, specifically in the corresponding body of definite user name Whether it is the identity distribution system permission in decision-making system during part;If unallocated system permission is then shown without any content The page;If distribution system permission, then the corresponding display content of the system permission is shown in the page.
Further, in embodiments of the present invention, the processing module 202 is additionally operable to getting user input by user Name and password, password input by user is encrypted by Advanced Encryption Standard;And by encrypted password with the shape of ciphertext Formula stores in the database.
Further, in embodiments of the present invention, the processing module 202 is additionally operable to detect whether there are user to activation The instruction that code is added and binds;If in the presence of the active coding of addition or user bound input.
Further, in embodiments of the present invention, the processing module 202 is additionally operable to obtain the instruction for transferring system log; According to described instruction, the corresponding system log of the user is transferred out, and shows the system log.
Although the preferred embodiment of the application has been described, one of ordinary skilled in the art once knows substantially Creative concept can then make these embodiments other change and modification.So appended claims are intended to be construed to wrap It includes preferred embodiment and falls into all change and modification of the application scope, including determining vertex using special symbol, mark Wait changes mode.
Obviously, those skilled in the art can carry out the application essence of the various modification and variations without departing from the application God and scope.In this way, if these modifications and variations of the application belong to the scope of the application claim and its equivalent technologies Within, then the application is also intended to comprising including these modification and variations.

Claims (10)

  1. A kind of 1. multi User Privilege Management method, which is characterized in that the described method includes:
    When getting user name input by user and password, verify whether the user name and password are correct;
    If so, according to the correspondence between user name and system identity, the corresponding identity of the user name is determined;
    Corresponding system permission is determined for the identity, and shows the corresponding display content of the system permission.
  2. 2. the method as described in claim 1, which is characterized in that determine corresponding system permission for the identity, and show institute The corresponding display content of system permission is stated, including:
    Whether it is the identity distribution system permission in decision-making system in the corresponding identity of definite user name;
    If unallocated system permission then shows the page without any content;
    If distribution system permission, then the corresponding display content of the system permission is shown in the page.
  3. 3. the method as described in claim 1, which is characterized in that the method further includes:
    User name input by user and password are being got, password input by user is being added by Advanced Encryption Standard It is close;
    And encrypted password is stored in the database in the form of ciphertext.
  4. 4. the method as described in claim 1, which is characterized in that after the corresponding display content of the system permission is shown, The method further includes:
    Detect whether the instruction for being added and binding to active coding there are user;
    If in the presence of the active coding of addition or user bound input.
  5. 5. the method as described in claim 1, which is characterized in that after the corresponding display content of the system permission is shown, The method further includes:
    Obtain the instruction for transferring system log;
    According to described instruction, the corresponding system log of the user is transferred out, and shows the system log.
  6. 6. a kind of multi User Privilege Management system, which is characterized in that the system comprises:
    Authentication module, for when getting user name input by user and password, verifying that the user name and password be It is no correct;
    Processing module, for when being verified, according to the correspondence between user name and system identity, determining the user The corresponding identity of name;Corresponding system permission is determined for the identity, and shows the corresponding display content of the system permission.
  7. 7. system as claimed in claim 6, which is characterized in that the processing module, specifically for being corresponded in definite user name Identity when, whether be the identity distribution system permission in decision-making system;If unallocated system permission is then shown without any The page of content;If distribution system permission, then the corresponding display content of the system permission is shown in the page.
  8. 8. system as claimed in claim 6, which is characterized in that the processing module, be additionally operable to get it is input by user Password input by user is encrypted by Advanced Encryption Standard for user name and password;And by encrypted password with ciphertext Form storage in the database.
  9. 9. system as claimed in claim 6, which is characterized in that the processing module is additionally operable to detect whether that there are users couple The instruction that active coding is added and binds;If in the presence of the active coding of addition or user bound input.
  10. 10. system as claimed in claim 6, which is characterized in that the processing module is additionally operable to obtain and transfers system log Instruction;According to described instruction, the corresponding system log of the user is transferred out, and shows the system log.
CN201810019582.6A 2018-01-09 2018-01-09 A kind of multi User Privilege Management method and system Pending CN108090374A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810019582.6A CN108090374A (en) 2018-01-09 2018-01-09 A kind of multi User Privilege Management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810019582.6A CN108090374A (en) 2018-01-09 2018-01-09 A kind of multi User Privilege Management method and system

Publications (1)

Publication Number Publication Date
CN108090374A true CN108090374A (en) 2018-05-29

Family

ID=62181849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810019582.6A Pending CN108090374A (en) 2018-01-09 2018-01-09 A kind of multi User Privilege Management method and system

Country Status (1)

Country Link
CN (1) CN108090374A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110378087A (en) * 2019-07-24 2019-10-25 四川爱创科技有限公司 Self-service terminal management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1464402A (en) * 2002-06-10 2003-12-31 联想(北京)有限公司 User identification confirmation and operation conferring process
CN102004866A (en) * 2009-09-01 2011-04-06 上海杉达学院 Method and device for user identity verification and access control of information system
CN102043993A (en) * 2009-10-13 2011-05-04 上海虹迪物流配送有限公司 System control method for transport management system
CN104980570A (en) * 2014-04-11 2015-10-14 昆山研达电脑科技有限公司 Multi-user personalized configuration method for mobile equipment
CN106815503A (en) * 2017-02-24 2017-06-09 郑州云海信息技术有限公司 A kind of operating system method for managing user right and system
CN107342992A (en) * 2017-06-27 2017-11-10 努比亚技术有限公司 A kind of System right management method, apparatus and computer-readable recording medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1464402A (en) * 2002-06-10 2003-12-31 联想(北京)有限公司 User identification confirmation and operation conferring process
CN102004866A (en) * 2009-09-01 2011-04-06 上海杉达学院 Method and device for user identity verification and access control of information system
CN102043993A (en) * 2009-10-13 2011-05-04 上海虹迪物流配送有限公司 System control method for transport management system
CN104980570A (en) * 2014-04-11 2015-10-14 昆山研达电脑科技有限公司 Multi-user personalized configuration method for mobile equipment
CN106815503A (en) * 2017-02-24 2017-06-09 郑州云海信息技术有限公司 A kind of operating system method for managing user right and system
CN107342992A (en) * 2017-06-27 2017-11-10 努比亚技术有限公司 A kind of System right management method, apparatus and computer-readable recording medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110378087A (en) * 2019-07-24 2019-10-25 四川爱创科技有限公司 Self-service terminal management method and system

Similar Documents

Publication Publication Date Title
CN109522735B (en) Data permission verification method and device based on intelligent contract
US20200019714A1 (en) Distributed data storage by means of authorisation token
US9769137B2 (en) Extensible mechanism for securing objects using claims
US8417964B2 (en) Software module management device and program
US20140007215A1 (en) Mobile applications platform
CN115391749A (en) Method and system for protecting computer software using distributed hash table and blockchain
CN103605930A (en) Double file anti-divulging method and system based on HOOK and filtering driving
CN105516110A (en) Mobile equipment secure data transmission method
WO2003038578A2 (en) User access control to distributed resources on a data communications network
CN108123795A (en) Distributing method, application process, publishing platform and the system of quantum key chip
US9942047B2 (en) Controlling application access to mobile device functions
US8060464B2 (en) Data-centric distributed computing
US20170171192A1 (en) Managing exchanges of sensitive data
CN102685122B (en) The method of the software protection based on cloud server
Noctor PSD2: Is the banking industry prepared?
US8863241B2 (en) System and method for managing usage rights of software applications
CN105450581A (en) Authority control method and device
US9443067B1 (en) System for the distribution and deployment of applications, with provisions for security and policy conformance
CN109766708B (en) Data resource access method, system, computer system and storage medium
CN102202306A (en) Mobile security authentication terminal and method
CN105450750A (en) Secure interaction method for intelligent terminal
CN101414913A (en) Computer network authentication system and method based on virtual technology
CN106951795A (en) A kind of application data access partition method and device
CN115730338A (en) Zero-trust sensitive big data cross-domain sharing method and device based on privacy calculation
KR20120067105A (en) Social verification login system being possible to verify user and providing method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180529