CN109657435A - Control method, equipment, system and the medium of user's access mandate - Google Patents

Control method, equipment, system and the medium of user's access mandate Download PDF

Info

Publication number
CN109657435A
CN109657435A CN201811559791.6A CN201811559791A CN109657435A CN 109657435 A CN109657435 A CN 109657435A CN 201811559791 A CN201811559791 A CN 201811559791A CN 109657435 A CN109657435 A CN 109657435A
Authority
CN
China
Prior art keywords
user
newly
access
counter
login user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811559791.6A
Other languages
Chinese (zh)
Inventor
白敏�
罗炳聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qianxin Technology Co Ltd
Original Assignee
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qianxin Technology Co Ltd filed Critical Beijing Qianxin Technology Co Ltd
Priority to CN201811559791.6A priority Critical patent/CN109657435A/en
Publication of CN109657435A publication Critical patent/CN109657435A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Present disclose provides a kind of control methods of user's access mandate, comprising: S1, one list of setting and a counter, list are used to record the log-on message of the user with access authority, and counter is used to record the quantity of the user with access authority;S2, when a newly-increased login user, if newly-increased login user, for legitimate user and when counter is less than a preset threshold, list records increase the log-on message of login user newly, otherwise the value of refresh counter increases login user newly without access authority;S3, when any login user within a preset time without operation when, log off user.

Description

Control method, equipment, system and the medium of user's access mandate
Technical field
This disclosure relates to a kind of control method, equipment, system and the medium of user's access mandate.
Background technique
In threatening information service and other big data business batch request scene, limitation multi-user login and access are special The scene of different permission is relatively more, and for different role, permission user needs to return different business data, at the same limit queries and Concurrent data is to control issuing for cloud business data.
Whether existing method only there is access authority to judge according to user, not to the quantity of login user and visit It asks that the time is limited, is unfavorable for improving the verification efficiency and log in efficiency that user logs in.
Summary of the invention
The disclosure in view of the above problems, provides a kind of control method of user's access mandate, the medium of equipment, system. By carrying out validity judgement to newly-increased login user, for legal newly-increased login user, if the existing login with permission User is no more than preset value, authorizes the newly-increased login user access authority, and otherwise the newly-increased login user is without access authority, when existing Have login user be more than a preset time without any operation when, the login user is exited, thus ensuring user's login security While, it effectively increases the verification efficiency of user's login and logs in efficiency.
An aspect of this disclosure provides a kind of control method of user's access mandate, comprising: S1, setting one list with One counter, the list are used to record the log-on message of the user with access authority, and the counter has for recording The quantity of the user of access authority;S2, when a newly-increased login user, if newly-increased login user is legitimate user and the counting When device is less than a preset threshold, increases the log-on message of login user described in the list records newly, updates the value of the counter, Otherwise, the newly-increased login user is without access authority;S3, when any login user within a preset time without operation when, move back The login user out.
Optionally, the step S2 further include: one preset rules of setting judge the log-on message of the newly-increased login user Whether in the preset rules, if the newly-increased login user is legitimate user, and otherwise, the newly-increased login user is Illegal user.
Optionally, the step S3 further include: if the login user has access authority, delete described in the list The identity information of login user updates the value of the counter.
Optionally, the method also includes: when any user with access authority logs off, described in deletion The identity information of user described in list with access authority, updates the value of the counter.
Optionally, the log-on message includes the IP address of the user, landing time, logs in identity.
Optionally, the method also includes: one storage unit of setting is stored with each login in the storage unit The data of most one kind of identity access times or more.
Optionally, the method also includes: when increasing N number of legal login user newly, if N is not more than the preset threshold With the difference between the counter, N number of legal login user has access authority, and otherwise, described N number of legal steps on Family is employed without access authority.
On the other hand the disclosure additionally provides a kind of controlling electronic devices of user's access mandate, comprising: processor;Storage Device is stored with computer executable program, and described program by the processor when being executed, so that the processor executes State the control method of user's access mandate.
On the other hand the disclosure additionally provides a kind of system of the control of user's access mandate, user's access mandate The system of control includes: setup module, and for a list and a counter to be arranged, the list has access authority for recording User log-on message, the counter be used for record have access authority user quantity;Authorization module, for when new When increasing a login user, if increasing login user newly for legitimate user and when the counter is less than a preset threshold, the list The log-on message for recording the newly-increased login user, updates the value of the counter, and otherwise, the newly-increased login user is without access Permission;Timeout treatment module, for when any login user within a preset time without operation when, exit logins use Family.
On the other hand the disclosure additionally provides a kind of computer readable storage medium, be stored thereon with computer program, should The control method of above-mentioned user's access mandate is realized when program is executed by processor.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the flow chart of the control method of the user's access mandate provided according to the embodiment of the present disclosure.
Fig. 2 diagrammatically illustrates the detailed process of the control method of the user's access mandate provided according to the embodiment of the present disclosure Figure.
Fig. 3 diagrammatically illustrates the block diagram of the electronic equipment according to the disclosure.
Fig. 4 diagrammatically illustrates the block diagram of the control system of user's access mandate of the embodiment of the present disclosure.
Specific embodiment
According in conjunction with attached drawing to the described in detail below of disclosure exemplary embodiment, other aspects, the advantage of the disclosure Those skilled in the art will become obvious with prominent features.
In the disclosure, term " includes " and " containing " and its derivative mean including rather than limit;Term "or" is packet Containing property, mean and/or.
In the present specification, following various embodiments for describing disclosure principle only illustrate, should not be with any Mode is construed to limitation scope of disclosure.Referring to attached drawing the comprehensive understanding described below that is used to help by claim and its equivalent The exemplary embodiment for the disclosure that object limits.Described below includes a variety of details to help to understand, but these details are answered Think to be only exemplary.Therefore, it will be appreciated by those of ordinary skill in the art that without departing substantially from the scope of the present disclosure and spirit In the case where, embodiment described herein can be made various changes and modifications.In addition, for clarity and brevity, The description of known function and structure is omitted.In addition, running through attached drawing, same reference numbers are used for identity function and operation.
Fig. 1 diagrammatically illustrates the flow chart of the control method of the user's access mandate provided according to the embodiment of the present disclosure. Fig. 2 diagrammatically illustrates the specific flow chart of the control method of the user's access mandate provided according to the embodiment of the present disclosure.In conjunction with Fig. 1 the method is described in detail in Fig. 2, as shown in Figure 1, this method includes following operation:
S1, one list of setting and a counter, the list are used to record the log-on message of the user with access authority, should Counter is used to record the quantity of the user with access authority.
Log-on message includes IP address, landing time and the login identity of user, wherein IP address is the two of one 32 System number is usually divided into 4 " 8 bits ", such as 100.4.5.6, when login time is logging in system by user Correct time, such as 30 divide 50 seconds when 10 days 8 October in 2018, login identity is the identity of user within the system, is such as managed Member, ordinary user etc..
Access authority refers to that the login user in a certain system has and accesses the system related service module and obtain correlation The ability of business datum.
IP address, landing time and login identity, the counter that list is used to record the user with access authority are used for Record the quantity with the user of access authority.
In addition, being additionally provided with a storage unit in system, each login identity access times are stored in the storage unit The data of most one kind or more.For example, including two kinds of login identity of administrator and ordinary user, management in a certain system The most business of member's inquiry times is tri- modules of A, B and C, and the most business of common user query number is two moulds of C and D Block, then the storage unit can cache the business of tetra- modules of A, B, C, D, and the pressure of data query is reduced with this, and Storage unit business periodically most to administrator and common user query number is updated, and guarantees to protect in the storage unit There is each business datum for logging in identity most frequentation and asking.
S2, when a newly-increased login user, if newly-increased login user is legitimate user and counter is less than a preset threshold When, list records increase the log-on message of login user newly, and the value of refresh counter, otherwise, the newly-increased login user is without access right Limit.
Operating S2 includes following sub-operation:
S21, judgement currently have whether the quantity of the user of access authority is less than preset threshold, if so, executing sub-operation S22, otherwise, the newly-increased login user do not have access authority.
Preset threshold is that system allows while accessing the system related service module and obtaining the user of associated traffic data Maximum quantity.For example, the quantity of the user in list with access authority is counted by defining max_num, it is any newly-increased Max_num adds 1 when user with access authority, maintains the size of a fixing barrel, and max_allow_operator_ is such as arranged Num=50 shows to allow 50 users while accessing the system, that is, limits the maximum quantity with the user of access authority, Middle max_num realizes the function of counter.
S22 carries out validity decision to the identity information of newly-increased login user.One preset rules are set, judge that this is newly-increased The log-on message of login user whether in preset rules, if, increase newly login user be legitimate user, execute sub-operation S23, Otherwise, increasing login user newly is illegal user, which does not have access authority still after logging in, i.e., cannot access system correlation Business module simultaneously obtains associated traffic data.
Preset rules are according to the IP address of user, landing time and to log in the prepared illegal login user of filtering of identity Rule.When a newly-increased login user, according to the IP address of user, landing time, log in the Role judgement user whether be Legitimate user.
S23, the newly-increased login user are login user legal and with access authority, and list records increase login user newly IP address, landing time and log in identity, the value of counter adds 1, and system returns to associated traffic data and uses to newly-increased log in Family.
In addition, when increasing N number of legal login user newly, if N is no more than the difference between preset threshold and counter, N A legal login user has access authority, and otherwise, N number of legal login user is without access authority.For example, system allows 50 A user accesses the system simultaneously, and current existing 46 users have the permission for accessing the system, increases N number of legal step on newly at this time Family is employed, if N≤4, this four users all have access authority, if N > 4, this four with per family without access authority.
S3, when any login user within a preset time without any operation when, exit the login user.
Setting time-out is periodically automatically deleted user's mechanism, i.e., when user within a preset time without any operation when, move back automatically The system out, while the record of refresh list and counter.
Specifically, for a certain user, when the user (such as requests in preset time (such as half an hour) without any operation Business datum, mobile mouse, input data etc.), which will automatically exit from system, if the user is the use with access authority Family the IP address of the user, landing time and logs in identity in delete list, and counter subtracts 1, if the user is no access authority User, list and counter are not operated.
In addition, when any user with access authority logs off, the IP address of the user in delete list is logged in Time and login identity, counter subtract 1.
As shown in figure 3, electronic equipment 300 includes processor 310, computer readable storage medium 320.The electronic equipment 300 can execute the method above with reference to Fig. 1 and Fig. 2 description, to carry out Message Processing.
Specifically, processor 310 for example may include general purpose microprocessor, instruction set processor and/or related chip group And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 310 can also include using for caching The onboard storage device on way.Processor 310 can be for executing the side according to the embodiment of the present disclosure for referring to Fig. 1 and Fig. 2 and describing Single treatment unit either multiple processing units of the different movements of method process.
Computer readable storage medium 320, such as can be times can include, store, transmitting, propagating or transmitting instruction Meaning medium.For example, readable storage medium storing program for executing can include but is not limited to electricity, magnetic, optical, electromagnetic, infrared or semiconductor system, device, Device or propagation medium.The specific example of readable storage medium storing program for executing includes: magnetic memory apparatus, such as tape or hard disk (HDD);Optical storage Device, such as CD (CD-ROM);Memory, such as random access memory (RAM) or flash memory;And/or wire/wireless communication chain Road.
Computer readable storage medium 320 may include computer program 321, which may include generation Code/computer executable instructions execute processor 310 for example above in conjunction with Fig. 1 and figure Method flow described in 2 and its any deformation.
Computer program 321 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 321 may include one or more program modules, for example including 321A, module 321B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 310 When execution, processor 310 is executed for example above in conjunction with method flow described in Fig. 1 and Fig. 2 and its any deformation.
In accordance with an embodiment of the present disclosure, computer-readable medium can be computer-readable signal media or computer can Read storage medium either the two any combination.Computer readable storage medium for example can be --- but it is unlimited In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or The above-mentioned any appropriate combination of person.In the disclosure, computer readable storage medium can be it is any include or storage program Tangible medium, which can be commanded execution system, device or device use or in connection.And in this public affairs In opening, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by Instruction execution system, device or device use or program in connection.The journey for including on computer-readable medium Sequence code can transmit with any suitable medium, including but not limited to: wireless, wired, optical cable, radiofrequency signal etc., or Above-mentioned any appropriate combination.
Fig. 4 diagrammatically illustrates the block diagram of the control system of user's access mandate of the embodiment of the present disclosure.
As shown in figure 4, the control system of user's access mandate includes setup module 410, authorization module 420, timeout treatment Module 430.
Specifically, setup module 410, for a list and a counter to be arranged, which has access right for recording The log-on message of the user of limit, the counter are used to record the quantity of the user with access authority, wherein log-on message includes IP address, landing time and the login identity of user, is visited in addition, also storing each login identity by one storage unit of setting Ask the data of most one kind of number or more.
Authorization module 420, for when a newly-increased login user, if currently the quantity of the user with access authority whether Judge that the login user is legal less than preset threshold, and by the IP address of login user, landing time and login identity When user, the login user access authority is authorized, and list records increase IP address, landing time and the login of login user newly Identity, the value of counter add 1, and system returns to associated traffic data and increases login user newly to this, otherwise, no access that Adds User Permission.
Timeout treatment module 430, for when login user within a preset time it is any without operation when, exit logins use Family, if the login user has access authority, the IP address of the login user, landing time and login identity in delete list, The value of counter subtracts 1, if the user is the user without access authority, does not operate to list and counter.
It is understood that setup module 410, authorization module 420, timeout treatment module 430 may be incorporated in a mould It is realized in block or any one module therein can be split into multiple modules.Alternatively, one or more in these modules At least partly function of a module can be combined at least partly function of other modules, and be realized in a module.Root According to the embodiment of the present invention, at least one of setup module 410, authorization module 420, timeout treatment module 430 can be at least It is implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic array (PLA), on piece system System, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC), or can be to be integrated or be encapsulated to circuit The hardware such as any other rational method or firmware realize, or with software, three kinds of implementations of hardware and firmware it is suitable When combination is realized.Alternatively, at least one of setup module 410, authorization module 420, timeout treatment module 430 can be at least It is implemented partly as computer program module, when the program is run by computer, the function of corresponding module can be executed.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations or/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, those skilled in the art are shown and described with reference to the certain exemplary embodiments of the disclosure It, can be with it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents A variety of changes in form and details are carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, but It should be not only determined by appended claims, be also defined by the equivalent of appended claims.

Claims (10)

1. a kind of control method of user's access mandate, which is characterized in that method includes:
S1, one list of setting and a counter, the list is used to record the log-on message of the user with access authority, described Counter is used to record the quantity of the user with access authority;
S2, when a newly-increased login user, if newly-increased login user is legitimate user and the counter is less than a preset threshold When, it increases the log-on message of login user described in the list records newly, updates the value of the counter, it is otherwise, described newly-increased to step on Family is employed without access authority;
S3, when any login user within a preset time without operation when, exit the login user.
2. the control method of user's access mandate according to claim 1, which is characterized in that the step S2 further include:
One preset rules are set, the log-on message of the newly-increased login user are judged whether in the preset rules, if in institute Stating newly-increased login user is legitimate user, and otherwise, the newly-increased login user is illegal user.
3. the control method of user's access mandate according to claim 1, which is characterized in that the step S3 further include:
If the login user has access authority, the identity information of login user described in the list is deleted, described in update The value of counter.
4. the control method of user's access mandate according to claim 1, which is characterized in that the method also includes: when When any user with access authority logs off, the body of the user described in the list with access authority is deleted Part information, updates the value of the counter.
5. the control method of user's access mandate according to claim 1, which is characterized in that the log-on message includes institute It states the IP address of user, landing time, log in identity.
6. the control method of user's access mandate according to claim 1, which is characterized in that the method also includes: it sets A storage unit is set, each number for logging in most one kind of identity access times or more is stored in the storage unit According to.
7. the control method of user's access mandate according to claim 1, which is characterized in that the method also includes: when When increasing N number of legal login user newly, if N is no more than the difference between the preset threshold and the counter, N number of conjunction The login user of method has access authority, and otherwise, N number of legal login user is without access authority.
8. a kind of controlling electronic devices of user's access mandate characterized by comprising
Processor;
Memory is stored with computer executable program, and described program by the processor when being executed, so that the processing Device executes the control method such as user's access mandate in claim 1-7.
9. a kind of system of the control of user's access mandate, which is characterized in that the system packet of the control of user's access mandate It includes:
Setup module, for a list and a counter to be arranged, the list is used to record stepping on for the user with access authority Information is recorded, the counter is used to record the quantity of the user with access authority;
Authorization module, for when a newly-increased login user, login user to be legitimate user and the counter is less than if increasing newly When one preset threshold, increases the log-on message of login user described in the list records newly, update the value of the counter, otherwise, The newly-increased login user is without access authority;
Timeout treatment module, for when any login user within a preset time without operation when, exit the login user.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed The control method such as user's access mandate in claim 1-7 is realized when device executes.
CN201811559791.6A 2018-12-19 2018-12-19 Control method, equipment, system and the medium of user's access mandate Pending CN109657435A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811559791.6A CN109657435A (en) 2018-12-19 2018-12-19 Control method, equipment, system and the medium of user's access mandate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811559791.6A CN109657435A (en) 2018-12-19 2018-12-19 Control method, equipment, system and the medium of user's access mandate

Publications (1)

Publication Number Publication Date
CN109657435A true CN109657435A (en) 2019-04-19

Family

ID=66115193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811559791.6A Pending CN109657435A (en) 2018-12-19 2018-12-19 Control method, equipment, system and the medium of user's access mandate

Country Status (1)

Country Link
CN (1) CN109657435A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181808A (en) * 2019-12-28 2020-05-19 苏州浪潮智能科技有限公司 Method and system for testing BMC IP access control

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821119A (en) * 2011-06-10 2012-12-12 北大方正集团有限公司 Client end, method, system and equipment for uploading files
CN104219326A (en) * 2014-09-23 2014-12-17 深圳市爱洁家环保科技有限公司 Resource sharing device and method in cleaning service information management system
CN105976123A (en) * 2016-05-19 2016-09-28 成都零线科技有限公司 Implementation method of airport server simulation system
CN108848113A (en) * 2018-08-15 2018-11-20 广州视源电子科技股份有限公司 Client device log-in control method, device, storage medium and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821119A (en) * 2011-06-10 2012-12-12 北大方正集团有限公司 Client end, method, system and equipment for uploading files
CN104219326A (en) * 2014-09-23 2014-12-17 深圳市爱洁家环保科技有限公司 Resource sharing device and method in cleaning service information management system
CN105976123A (en) * 2016-05-19 2016-09-28 成都零线科技有限公司 Implementation method of airport server simulation system
CN108848113A (en) * 2018-08-15 2018-11-20 广州视源电子科技股份有限公司 Client device log-in control method, device, storage medium and server

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181808A (en) * 2019-12-28 2020-05-19 苏州浪潮智能科技有限公司 Method and system for testing BMC IP access control

Similar Documents

Publication Publication Date Title
US10002152B2 (en) Client computer for updating a database stored on a server via a network
US20210082293A1 (en) Unmanned aerial vehicle control method and device
US9319411B2 (en) Security management for cloud services
US20150347783A1 (en) Database access control for multi-tier processing
US20170177638A1 (en) Predictive object tiering based on object metadata
CN110199283B (en) System and method for authenticating platform trust in a network functions virtualization environment
US20200076799A1 (en) Device aware network communication management
US11200121B2 (en) Performance efficient time locks on data in a storage controller
CN104303534B (en) Method and computer for being verified to mobile device
CN104320389A (en) Fusion identify protection system and fusion identify protection method based on cloud computing
CN110445769A (en) The access method and device of operation system
CN105787382B (en) access control method and device
CN110096542A (en) Data verification processing method, device, system and the medium of decentralization
CN105893456B (en) The isolated method and system of the computing basic facility of geography fence perception
US9514290B2 (en) Authorization cache
CN113039542A (en) Secure counting in cloud computing networks
US9208234B2 (en) Database row access control
US9276943B2 (en) Authorizing a change within a computer system
CN110414245B (en) Method, apparatus and computer program product for managing encryption keys in a storage system
KR102069691B1 (en) Apparatus and method for managing metadata
CN110457307B (en) Metadata management system, user cluster creation method, device, equipment and medium
CN109657435A (en) Control method, equipment, system and the medium of user's access mandate
US20130145433A1 (en) Using a local authorization extension to provide access authorization for a module to access a computing system
CN108268769A (en) The method and system of data access entitlement are performed to user
US11120135B2 (en) Updating security information on multiple computing machines

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100088 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing

Applicant after: Qianxin Technology Group Co., Ltd.

Address before: 100016 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Applicant before: BEIJING QI'ANXIN SCIENCE & TECHNOLOGY CO., LTD.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190419

RJ01 Rejection of invention patent application after publication