CN109657435A - Control method, equipment, system and the medium of user's access mandate - Google Patents
Control method, equipment, system and the medium of user's access mandate Download PDFInfo
- Publication number
- CN109657435A CN109657435A CN201811559791.6A CN201811559791A CN109657435A CN 109657435 A CN109657435 A CN 109657435A CN 201811559791 A CN201811559791 A CN 201811559791A CN 109657435 A CN109657435 A CN 109657435A
- Authority
- CN
- China
- Prior art keywords
- user
- newly
- access
- counter
- login user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Present disclose provides a kind of control methods of user's access mandate, comprising: S1, one list of setting and a counter, list are used to record the log-on message of the user with access authority, and counter is used to record the quantity of the user with access authority;S2, when a newly-increased login user, if newly-increased login user, for legitimate user and when counter is less than a preset threshold, list records increase the log-on message of login user newly, otherwise the value of refresh counter increases login user newly without access authority;S3, when any login user within a preset time without operation when, log off user.
Description
Technical field
This disclosure relates to a kind of control method, equipment, system and the medium of user's access mandate.
Background technique
In threatening information service and other big data business batch request scene, limitation multi-user login and access are special
The scene of different permission is relatively more, and for different role, permission user needs to return different business data, at the same limit queries and
Concurrent data is to control issuing for cloud business data.
Whether existing method only there is access authority to judge according to user, not to the quantity of login user and visit
It asks that the time is limited, is unfavorable for improving the verification efficiency and log in efficiency that user logs in.
Summary of the invention
The disclosure in view of the above problems, provides a kind of control method of user's access mandate, the medium of equipment, system.
By carrying out validity judgement to newly-increased login user, for legal newly-increased login user, if the existing login with permission
User is no more than preset value, authorizes the newly-increased login user access authority, and otherwise the newly-increased login user is without access authority, when existing
Have login user be more than a preset time without any operation when, the login user is exited, thus ensuring user's login security
While, it effectively increases the verification efficiency of user's login and logs in efficiency.
An aspect of this disclosure provides a kind of control method of user's access mandate, comprising: S1, setting one list with
One counter, the list are used to record the log-on message of the user with access authority, and the counter has for recording
The quantity of the user of access authority;S2, when a newly-increased login user, if newly-increased login user is legitimate user and the counting
When device is less than a preset threshold, increases the log-on message of login user described in the list records newly, updates the value of the counter,
Otherwise, the newly-increased login user is without access authority;S3, when any login user within a preset time without operation when, move back
The login user out.
Optionally, the step S2 further include: one preset rules of setting judge the log-on message of the newly-increased login user
Whether in the preset rules, if the newly-increased login user is legitimate user, and otherwise, the newly-increased login user is
Illegal user.
Optionally, the step S3 further include: if the login user has access authority, delete described in the list
The identity information of login user updates the value of the counter.
Optionally, the method also includes: when any user with access authority logs off, described in deletion
The identity information of user described in list with access authority, updates the value of the counter.
Optionally, the log-on message includes the IP address of the user, landing time, logs in identity.
Optionally, the method also includes: one storage unit of setting is stored with each login in the storage unit
The data of most one kind of identity access times or more.
Optionally, the method also includes: when increasing N number of legal login user newly, if N is not more than the preset threshold
With the difference between the counter, N number of legal login user has access authority, and otherwise, described N number of legal steps on
Family is employed without access authority.
On the other hand the disclosure additionally provides a kind of controlling electronic devices of user's access mandate, comprising: processor;Storage
Device is stored with computer executable program, and described program by the processor when being executed, so that the processor executes
State the control method of user's access mandate.
On the other hand the disclosure additionally provides a kind of system of the control of user's access mandate, user's access mandate
The system of control includes: setup module, and for a list and a counter to be arranged, the list has access authority for recording
User log-on message, the counter be used for record have access authority user quantity;Authorization module, for when new
When increasing a login user, if increasing login user newly for legitimate user and when the counter is less than a preset threshold, the list
The log-on message for recording the newly-increased login user, updates the value of the counter, and otherwise, the newly-increased login user is without access
Permission;Timeout treatment module, for when any login user within a preset time without operation when, exit logins use
Family.
On the other hand the disclosure additionally provides a kind of computer readable storage medium, be stored thereon with computer program, should
The control method of above-mentioned user's access mandate is realized when program is executed by processor.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the flow chart of the control method of the user's access mandate provided according to the embodiment of the present disclosure.
Fig. 2 diagrammatically illustrates the detailed process of the control method of the user's access mandate provided according to the embodiment of the present disclosure
Figure.
Fig. 3 diagrammatically illustrates the block diagram of the electronic equipment according to the disclosure.
Fig. 4 diagrammatically illustrates the block diagram of the control system of user's access mandate of the embodiment of the present disclosure.
Specific embodiment
According in conjunction with attached drawing to the described in detail below of disclosure exemplary embodiment, other aspects, the advantage of the disclosure
Those skilled in the art will become obvious with prominent features.
In the disclosure, term " includes " and " containing " and its derivative mean including rather than limit;Term "or" is packet
Containing property, mean and/or.
In the present specification, following various embodiments for describing disclosure principle only illustrate, should not be with any
Mode is construed to limitation scope of disclosure.Referring to attached drawing the comprehensive understanding described below that is used to help by claim and its equivalent
The exemplary embodiment for the disclosure that object limits.Described below includes a variety of details to help to understand, but these details are answered
Think to be only exemplary.Therefore, it will be appreciated by those of ordinary skill in the art that without departing substantially from the scope of the present disclosure and spirit
In the case where, embodiment described herein can be made various changes and modifications.In addition, for clarity and brevity,
The description of known function and structure is omitted.In addition, running through attached drawing, same reference numbers are used for identity function and operation.
Fig. 1 diagrammatically illustrates the flow chart of the control method of the user's access mandate provided according to the embodiment of the present disclosure.
Fig. 2 diagrammatically illustrates the specific flow chart of the control method of the user's access mandate provided according to the embodiment of the present disclosure.In conjunction with
Fig. 1 the method is described in detail in Fig. 2, as shown in Figure 1, this method includes following operation:
S1, one list of setting and a counter, the list are used to record the log-on message of the user with access authority, should
Counter is used to record the quantity of the user with access authority.
Log-on message includes IP address, landing time and the login identity of user, wherein IP address is the two of one 32
System number is usually divided into 4 " 8 bits ", such as 100.4.5.6, when login time is logging in system by user
Correct time, such as 30 divide 50 seconds when 10 days 8 October in 2018, login identity is the identity of user within the system, is such as managed
Member, ordinary user etc..
Access authority refers to that the login user in a certain system has and accesses the system related service module and obtain correlation
The ability of business datum.
IP address, landing time and login identity, the counter that list is used to record the user with access authority are used for
Record the quantity with the user of access authority.
In addition, being additionally provided with a storage unit in system, each login identity access times are stored in the storage unit
The data of most one kind or more.For example, including two kinds of login identity of administrator and ordinary user, management in a certain system
The most business of member's inquiry times is tri- modules of A, B and C, and the most business of common user query number is two moulds of C and D
Block, then the storage unit can cache the business of tetra- modules of A, B, C, D, and the pressure of data query is reduced with this, and
Storage unit business periodically most to administrator and common user query number is updated, and guarantees to protect in the storage unit
There is each business datum for logging in identity most frequentation and asking.
S2, when a newly-increased login user, if newly-increased login user is legitimate user and counter is less than a preset threshold
When, list records increase the log-on message of login user newly, and the value of refresh counter, otherwise, the newly-increased login user is without access right
Limit.
Operating S2 includes following sub-operation:
S21, judgement currently have whether the quantity of the user of access authority is less than preset threshold, if so, executing sub-operation
S22, otherwise, the newly-increased login user do not have access authority.
Preset threshold is that system allows while accessing the system related service module and obtaining the user of associated traffic data
Maximum quantity.For example, the quantity of the user in list with access authority is counted by defining max_num, it is any newly-increased
Max_num adds 1 when user with access authority, maintains the size of a fixing barrel, and max_allow_operator_ is such as arranged
Num=50 shows to allow 50 users while accessing the system, that is, limits the maximum quantity with the user of access authority,
Middle max_num realizes the function of counter.
S22 carries out validity decision to the identity information of newly-increased login user.One preset rules are set, judge that this is newly-increased
The log-on message of login user whether in preset rules, if, increase newly login user be legitimate user, execute sub-operation S23,
Otherwise, increasing login user newly is illegal user, which does not have access authority still after logging in, i.e., cannot access system correlation
Business module simultaneously obtains associated traffic data.
Preset rules are according to the IP address of user, landing time and to log in the prepared illegal login user of filtering of identity
Rule.When a newly-increased login user, according to the IP address of user, landing time, log in the Role judgement user whether be
Legitimate user.
S23, the newly-increased login user are login user legal and with access authority, and list records increase login user newly
IP address, landing time and log in identity, the value of counter adds 1, and system returns to associated traffic data and uses to newly-increased log in
Family.
In addition, when increasing N number of legal login user newly, if N is no more than the difference between preset threshold and counter, N
A legal login user has access authority, and otherwise, N number of legal login user is without access authority.For example, system allows 50
A user accesses the system simultaneously, and current existing 46 users have the permission for accessing the system, increases N number of legal step on newly at this time
Family is employed, if N≤4, this four users all have access authority, if N > 4, this four with per family without access authority.
S3, when any login user within a preset time without any operation when, exit the login user.
Setting time-out is periodically automatically deleted user's mechanism, i.e., when user within a preset time without any operation when, move back automatically
The system out, while the record of refresh list and counter.
Specifically, for a certain user, when the user (such as requests in preset time (such as half an hour) without any operation
Business datum, mobile mouse, input data etc.), which will automatically exit from system, if the user is the use with access authority
Family the IP address of the user, landing time and logs in identity in delete list, and counter subtracts 1, if the user is no access authority
User, list and counter are not operated.
In addition, when any user with access authority logs off, the IP address of the user in delete list is logged in
Time and login identity, counter subtract 1.
As shown in figure 3, electronic equipment 300 includes processor 310, computer readable storage medium 320.The electronic equipment
300 can execute the method above with reference to Fig. 1 and Fig. 2 description, to carry out Message Processing.
Specifically, processor 310 for example may include general purpose microprocessor, instruction set processor and/or related chip group
And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 310 can also include using for caching
The onboard storage device on way.Processor 310 can be for executing the side according to the embodiment of the present disclosure for referring to Fig. 1 and Fig. 2 and describing
Single treatment unit either multiple processing units of the different movements of method process.
Computer readable storage medium 320, such as can be times can include, store, transmitting, propagating or transmitting instruction
Meaning medium.For example, readable storage medium storing program for executing can include but is not limited to electricity, magnetic, optical, electromagnetic, infrared or semiconductor system, device,
Device or propagation medium.The specific example of readable storage medium storing program for executing includes: magnetic memory apparatus, such as tape or hard disk (HDD);Optical storage
Device, such as CD (CD-ROM);Memory, such as random access memory (RAM) or flash memory;And/or wire/wireless communication chain
Road.
Computer readable storage medium 320 may include computer program 321, which may include generation
Code/computer executable instructions execute processor 310 for example above in conjunction with Fig. 1 and figure
Method flow described in 2 and its any deformation.
Computer program 321 can be configured to have the computer program code for example including computer program module.Example
Such as, in the exemplary embodiment, the code in computer program 321 may include one or more program modules, for example including
321A, module 321B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can
To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 310
When execution, processor 310 is executed for example above in conjunction with method flow described in Fig. 1 and Fig. 2 and its any deformation.
In accordance with an embodiment of the present disclosure, computer-readable medium can be computer-readable signal media or computer can
Read storage medium either the two any combination.Computer readable storage medium for example can be --- but it is unlimited
In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates
The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires
Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory
(EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or
The above-mentioned any appropriate combination of person.In the disclosure, computer readable storage medium can be it is any include or storage program
Tangible medium, which can be commanded execution system, device or device use or in connection.And in this public affairs
In opening, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable
Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by
Instruction execution system, device or device use or program in connection.The journey for including on computer-readable medium
Sequence code can transmit with any suitable medium, including but not limited to: wireless, wired, optical cable, radiofrequency signal etc., or
Above-mentioned any appropriate combination.
Fig. 4 diagrammatically illustrates the block diagram of the control system of user's access mandate of the embodiment of the present disclosure.
As shown in figure 4, the control system of user's access mandate includes setup module 410, authorization module 420, timeout treatment
Module 430.
Specifically, setup module 410, for a list and a counter to be arranged, which has access right for recording
The log-on message of the user of limit, the counter are used to record the quantity of the user with access authority, wherein log-on message includes
IP address, landing time and the login identity of user, is visited in addition, also storing each login identity by one storage unit of setting
Ask the data of most one kind of number or more.
Authorization module 420, for when a newly-increased login user, if currently the quantity of the user with access authority whether
Judge that the login user is legal less than preset threshold, and by the IP address of login user, landing time and login identity
When user, the login user access authority is authorized, and list records increase IP address, landing time and the login of login user newly
Identity, the value of counter add 1, and system returns to associated traffic data and increases login user newly to this, otherwise, no access that Adds User
Permission.
Timeout treatment module 430, for when login user within a preset time it is any without operation when, exit logins use
Family, if the login user has access authority, the IP address of the login user, landing time and login identity in delete list,
The value of counter subtracts 1, if the user is the user without access authority, does not operate to list and counter.
It is understood that setup module 410, authorization module 420, timeout treatment module 430 may be incorporated in a mould
It is realized in block or any one module therein can be split into multiple modules.Alternatively, one or more in these modules
At least partly function of a module can be combined at least partly function of other modules, and be realized in a module.Root
According to the embodiment of the present invention, at least one of setup module 410, authorization module 420, timeout treatment module 430 can be at least
It is implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic array (PLA), on piece system
System, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC), or can be to be integrated or be encapsulated to circuit
The hardware such as any other rational method or firmware realize, or with software, three kinds of implementations of hardware and firmware it is suitable
When combination is realized.Alternatively, at least one of setup module 410, authorization module 420, timeout treatment module 430 can be at least
It is implemented partly as computer program module, when the program is run by computer, the function of corresponding module can be executed.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants
It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule
The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can
To carry out multiple combinations or/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist
In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can
To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, those skilled in the art are shown and described with reference to the certain exemplary embodiments of the disclosure
It, can be with it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents
A variety of changes in form and details are carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, but
It should be not only determined by appended claims, be also defined by the equivalent of appended claims.
Claims (10)
1. a kind of control method of user's access mandate, which is characterized in that method includes:
S1, one list of setting and a counter, the list is used to record the log-on message of the user with access authority, described
Counter is used to record the quantity of the user with access authority;
S2, when a newly-increased login user, if newly-increased login user is legitimate user and the counter is less than a preset threshold
When, it increases the log-on message of login user described in the list records newly, updates the value of the counter, it is otherwise, described newly-increased to step on
Family is employed without access authority;
S3, when any login user within a preset time without operation when, exit the login user.
2. the control method of user's access mandate according to claim 1, which is characterized in that the step S2 further include:
One preset rules are set, the log-on message of the newly-increased login user are judged whether in the preset rules, if in institute
Stating newly-increased login user is legitimate user, and otherwise, the newly-increased login user is illegal user.
3. the control method of user's access mandate according to claim 1, which is characterized in that the step S3 further include:
If the login user has access authority, the identity information of login user described in the list is deleted, described in update
The value of counter.
4. the control method of user's access mandate according to claim 1, which is characterized in that the method also includes: when
When any user with access authority logs off, the body of the user described in the list with access authority is deleted
Part information, updates the value of the counter.
5. the control method of user's access mandate according to claim 1, which is characterized in that the log-on message includes institute
It states the IP address of user, landing time, log in identity.
6. the control method of user's access mandate according to claim 1, which is characterized in that the method also includes: it sets
A storage unit is set, each number for logging in most one kind of identity access times or more is stored in the storage unit
According to.
7. the control method of user's access mandate according to claim 1, which is characterized in that the method also includes: when
When increasing N number of legal login user newly, if N is no more than the difference between the preset threshold and the counter, N number of conjunction
The login user of method has access authority, and otherwise, N number of legal login user is without access authority.
8. a kind of controlling electronic devices of user's access mandate characterized by comprising
Processor;
Memory is stored with computer executable program, and described program by the processor when being executed, so that the processing
Device executes the control method such as user's access mandate in claim 1-7.
9. a kind of system of the control of user's access mandate, which is characterized in that the system packet of the control of user's access mandate
It includes:
Setup module, for a list and a counter to be arranged, the list is used to record stepping on for the user with access authority
Information is recorded, the counter is used to record the quantity of the user with access authority;
Authorization module, for when a newly-increased login user, login user to be legitimate user and the counter is less than if increasing newly
When one preset threshold, increases the log-on message of login user described in the list records newly, update the value of the counter, otherwise,
The newly-increased login user is without access authority;
Timeout treatment module, for when any login user within a preset time without operation when, exit the login user.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed
The control method such as user's access mandate in claim 1-7 is realized when device executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811559791.6A CN109657435A (en) | 2018-12-19 | 2018-12-19 | Control method, equipment, system and the medium of user's access mandate |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811559791.6A CN109657435A (en) | 2018-12-19 | 2018-12-19 | Control method, equipment, system and the medium of user's access mandate |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109657435A true CN109657435A (en) | 2019-04-19 |
Family
ID=66115193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811559791.6A Pending CN109657435A (en) | 2018-12-19 | 2018-12-19 | Control method, equipment, system and the medium of user's access mandate |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109657435A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111181808A (en) * | 2019-12-28 | 2020-05-19 | 苏州浪潮智能科技有限公司 | Method and system for testing BMC IP access control |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821119A (en) * | 2011-06-10 | 2012-12-12 | 北大方正集团有限公司 | Client end, method, system and equipment for uploading files |
CN104219326A (en) * | 2014-09-23 | 2014-12-17 | 深圳市爱洁家环保科技有限公司 | Resource sharing device and method in cleaning service information management system |
CN105976123A (en) * | 2016-05-19 | 2016-09-28 | 成都零线科技有限公司 | Implementation method of airport server simulation system |
CN108848113A (en) * | 2018-08-15 | 2018-11-20 | 广州视源电子科技股份有限公司 | Client device log-in control method, device, storage medium and server |
-
2018
- 2018-12-19 CN CN201811559791.6A patent/CN109657435A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821119A (en) * | 2011-06-10 | 2012-12-12 | 北大方正集团有限公司 | Client end, method, system and equipment for uploading files |
CN104219326A (en) * | 2014-09-23 | 2014-12-17 | 深圳市爱洁家环保科技有限公司 | Resource sharing device and method in cleaning service information management system |
CN105976123A (en) * | 2016-05-19 | 2016-09-28 | 成都零线科技有限公司 | Implementation method of airport server simulation system |
CN108848113A (en) * | 2018-08-15 | 2018-11-20 | 广州视源电子科技股份有限公司 | Client device log-in control method, device, storage medium and server |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111181808A (en) * | 2019-12-28 | 2020-05-19 | 苏州浪潮智能科技有限公司 | Method and system for testing BMC IP access control |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10002152B2 (en) | Client computer for updating a database stored on a server via a network | |
US20210082293A1 (en) | Unmanned aerial vehicle control method and device | |
US9319411B2 (en) | Security management for cloud services | |
US20150347783A1 (en) | Database access control for multi-tier processing | |
US20170177638A1 (en) | Predictive object tiering based on object metadata | |
CN110199283B (en) | System and method for authenticating platform trust in a network functions virtualization environment | |
US20200076799A1 (en) | Device aware network communication management | |
US11200121B2 (en) | Performance efficient time locks on data in a storage controller | |
CN104303534B (en) | Method and computer for being verified to mobile device | |
CN104320389A (en) | Fusion identify protection system and fusion identify protection method based on cloud computing | |
CN110445769A (en) | The access method and device of operation system | |
CN105787382B (en) | access control method and device | |
CN110096542A (en) | Data verification processing method, device, system and the medium of decentralization | |
CN105893456B (en) | The isolated method and system of the computing basic facility of geography fence perception | |
US9514290B2 (en) | Authorization cache | |
CN113039542A (en) | Secure counting in cloud computing networks | |
US9208234B2 (en) | Database row access control | |
US9276943B2 (en) | Authorizing a change within a computer system | |
CN110414245B (en) | Method, apparatus and computer program product for managing encryption keys in a storage system | |
KR102069691B1 (en) | Apparatus and method for managing metadata | |
CN110457307B (en) | Metadata management system, user cluster creation method, device, equipment and medium | |
CN109657435A (en) | Control method, equipment, system and the medium of user's access mandate | |
US20130145433A1 (en) | Using a local authorization extension to provide access authorization for a module to access a computing system | |
CN108268769A (en) | The method and system of data access entitlement are performed to user | |
US11120135B2 (en) | Updating security information on multiple computing machines |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100088 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing Applicant after: Qianxin Technology Group Co., Ltd. Address before: 100016 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing. Applicant before: BEIJING QI'ANXIN SCIENCE & TECHNOLOGY CO., LTD. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190419 |
|
RJ01 | Rejection of invention patent application after publication |