CN111966996A - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN111966996A
CN111966996A CN201910418985.2A CN201910418985A CN111966996A CN 111966996 A CN111966996 A CN 111966996A CN 201910418985 A CN201910418985 A CN 201910418985A CN 111966996 A CN111966996 A CN 111966996A
Authority
CN
China
Prior art keywords
user
data
information
authority
processed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910418985.2A
Other languages
Chinese (zh)
Inventor
李昂阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201910418985.2A priority Critical patent/CN111966996A/en
Publication of CN111966996A publication Critical patent/CN111966996A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

本发明实施例提供了一种数据处理方法,该方法包括:首先,可以接收用户针对第一数据的操作指令,其中,操作指令中携带用户的用户标识信息,然后,根据用户标识信息,确定用户的权限信息,进而,基于权限信息,从第一数据中确定待处理数据,根据操作指令,对待处理数据进行处理。在本方案中,根据用户的用户标识信息,可以确定该用户的权限信息,进而通过权限信息从第一数据中确定出该用户可以处理的待处理数据。可以理解,不同用户可以对应不同的权限信息,这样,即使是具有权限的用户,其能够处理的数据也受到权限信息的限制,难以实现对所有数据的处理,从而提高了数据的安全性。

Figure 201910418985

An embodiment of the present invention provides a data processing method, the method includes: first, receiving an operation instruction from a user for first data, wherein the operation instruction carries user identification information of the user, and then determining the user according to the user identification information the permission information, and further, based on the permission information, determine the data to be processed from the first data, and process the data to be processed according to the operation instruction. In this solution, according to the user identification information of the user, the authority information of the user can be determined, and then the to-be-processed data that can be processed by the user can be determined from the first data through the authority information. It can be understood that different users can correspond to different permission information. In this way, even a user with permission can process data limited by permission information, which makes it difficult to process all data, thereby improving data security.

Figure 201910418985

Description

一种数据处理方法及装置A data processing method and device

技术领域technical field

本发明涉及计算机应用技术领域,特别是涉及一种数据处理方法及装置。The present invention relates to the technical field of computer applications, in particular to a data processing method and device.

背景技术Background technique

一些场景中,设备中存储的数据具有一定的保密性,如果任一用户都可以对这些数据进行处理,可能会导致数据泄露。In some scenarios, the data stored in the device has a certain degree of confidentiality. If any user can process the data, it may lead to data leakage.

相关技术中,通常采取仅对特定用户授予操作权限的方式,防止数据泄露。若某一用户未被授予操作权限,则该用户无法对设备中存储的任一数据进行处理。若某一用户被授予操作权限,则该用户可以对设备中的所有数据进行处理。In the related art, the method of granting operation rights only to specific users is usually adopted to prevent data leakage. If a user is not authorized to operate, the user cannot process any data stored in the device. If a user is granted operation rights, the user can process all data in the device.

但是,在上述方法中,被授予操作权限的用户具有对所有数据进行处理的权限,也就是说,被授予操作权限的用户对数据的处理不受限制,数据的安全性不够高。However, in the above method, the user granted the operation authority has the authority to process all data, that is, the data processing by the user granted the operation authority is not restricted, and the data security is not high enough.

发明内容SUMMARY OF THE INVENTION

本发明实施例的目的在于提供一种数据处理方法及装置,以提高数据的安全性。具体技术方案如下:The purpose of the embodiments of the present invention is to provide a data processing method and apparatus to improve data security. The specific technical solutions are as follows:

本发明实施例提供了一种数据处理方法,所述方法包括:An embodiment of the present invention provides a data processing method, the method comprising:

接收用户针对第一数据的操作指令,所述操作指令中携带所述用户的用户标识信息;receiving an operation instruction from the user for the first data, where the operation instruction carries the user identification information of the user;

根据所述用户标识信息,确定所述用户的权限信息;According to the user identification information, determine the authority information of the user;

基于所述权限信息,从所述第一数据中确定待处理数据;determining data to be processed from the first data based on the permission information;

根据所述操作指令,对所述待处理数据进行处理。According to the operation instruction, the data to be processed is processed.

可选的,在所述接收用户针对第一数据的操作指令之前,所述方法还包括:Optionally, before receiving the user's operation instruction for the first data, the method further includes:

获取用户输入的用户名及用户密码;Obtain the user name and user password entered by the user;

判断所述用户名与所述用户密码是否匹配;Determine whether the user name matches the user password;

若匹配,则判定所述用户认证成功,执行所述接收用户针对第一数据的操作指令的步骤。If there is a match, it is determined that the user authentication is successful, and the step of receiving the user's operation instruction for the first data is performed.

可选的,在判定所述用户名与所述用户密码匹配的情况下,所述方法还包括:Optionally, when it is determined that the user name matches the user password, the method further includes:

根据所述用户名与所述用户密码,判断所述用户是否为高权限用户;According to the user name and the user password, determine whether the user is a high-authority user;

若是,则接收所述高权限用户输入的权限配置信息,根据所述权限配置信息,确定所述高权限用户之外的其他用户的权限信息,建立用户标识信息与权限信息之间的对应关系;If yes, then receive the authority configuration information input by the high-authority user, determine the authority information of other users other than the high-authority user according to the authority configuration information, and establish a corresponding relationship between the user identification information and the authority information;

所述根据所述用户标识信息,确定所述用户的权限信息,包括:The determining the authority information of the user according to the user identification information includes:

根据所述用户标识信息,从所建立的用户标识信息与权限信息之间的对应关系中,查询所述用户的权限信息。According to the user identification information, the authority information of the user is queried from the established correspondence between the user identification information and the authority information.

可选的,所述所述权限信息为权限开放时间段;所述基于所述权限信息,从所述第一数据中确定待处理数据,包括:Optionally, the permission information is a permission opening time period; the determining the data to be processed from the first data based on the permission information includes:

确定所述权限开放时间段与所述第一数据的采集时间段之间的重合时间段;determining the overlapping time period between the permission opening time period and the first data collection time period;

从所述第一数据中选择在所述重合时间段内采集的数据,作为待处理数据。The data collected in the coincident time period is selected from the first data as the data to be processed.

可选的,所述操作指令为数据下载指令;所述根据所述操作指令,对所述待处理数据进行处理,包括:Optionally, the operation instruction is a data download instruction; and the processing of the data to be processed according to the operation instruction includes:

根据所述用户标识信息,确定所述用户对应的加密信息;According to the user identification information, determine the encrypted information corresponding to the user;

根据所述加密信息,对所述待处理数据进行加密,下载加密后的待处理数据。According to the encrypted information, the data to be processed is encrypted, and the encrypted data to be processed is downloaded.

本发明实施例还提供了一种数据处理装置,所述装置包括:An embodiment of the present invention further provides a data processing device, the device comprising:

接收模块,用于接收用户针对第一数据的操作指令,所述操作指令中携带所述用户的用户标识信息;a receiving module, configured to receive an operation instruction of the user for the first data, where the operation instruction carries the user identification information of the user;

确定模块,用于根据所述用户标识信息,确定所述用户的权限信息;a determining module, configured to determine the authority information of the user according to the user identification information;

选择模块,用于基于所述权限信息,从所述第一数据中确定待处理数据;a selection module, configured to determine data to be processed from the first data based on the permission information;

处理模块,用于根据所述操作指令,对所述待处理数据进行处理。The processing module is configured to process the data to be processed according to the operation instruction.

可选的,所述装置还包括:Optionally, the device further includes:

认证模块,用于获取用户输入的用户名及用户密码;判断所述用户名与所述用户密码是否匹配;若匹配,则判定所述用户认证成功,触发所述接收模块。The authentication module is used for obtaining the user name and user password input by the user; judging whether the user name matches the user password; if they match, judging that the user authentication is successful, and triggering the receiving module.

可选的,所述装置还包括:Optionally, the device further includes:

判断模块,用于根据所述用户名与所述用户密码,判断所述用户是否为高权限用户;若是,则触发配置模块;a judgment module, configured to judge whether the user is a high-authority user according to the user name and the user password; if so, trigger a configuration module;

所述配置模块,用于接收所述高权限用户输入的权限配置信息,根据所述权限配置信息,确定所述高权限用户之外的其他用户的权限信息,建立用户标识信息与权限信息之间的对应关系;The configuration module is used to receive the authority configuration information input by the high-authority user, determine the authority information of other users other than the high-authority user according to the authority configuration information, and establish a relationship between the user identification information and the authority information. the corresponding relationship;

所述确定模块,具体用于根据所述用户标识信息,从所建立的用户标识信息与权限信息之间的对应关系中,查询所述用户的权限信息。The determining module is specifically configured to query the authority information of the user from the established correspondence between the user identification information and the authority information according to the user identification information.

可选的,所述所述权限信息为权限开放时间段;所述选择模块,具体用于:Optionally, the permission information is a permission opening time period; the selection module is specifically used for:

确定所述权限开放时间段与所述第一数据的采集时间段之间的重合时间段;determining the overlapping time period between the permission opening time period and the first data collection time period;

从所述第一数据中选择在所述重合时间段内采集的数据,作为待处理数据。The data collected in the coincident time period is selected from the first data as the data to be processed.

可选的,所述操作指令为数据下载指令;所述处理模块,具体用于:Optionally, the operation instruction is a data download instruction; the processing module is specifically used for:

根据所述用户标识信息,确定所述用户对应的加密信息;According to the user identification information, determine the encrypted information corresponding to the user;

根据所述加密信息,对所述待处理数据进行加密,下载加密后的待处理数据。According to the encrypted information, the data to be processed is encrypted, and the encrypted data to be processed is downloaded.

本发明实施例还提供了一种电子设备,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;An embodiment of the present invention further provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory communicate with each other through the communication bus;

存储器,用于存放计算机程序;memory for storing computer programs;

处理器,用于执行存储器上所存放的程序时,实现上述任一所述的数据处理方法步骤。The processor is configured to implement any of the data processing method steps described above when executing the program stored in the memory.

本发明实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现上述任一所述的数据处理方法步骤。Embodiments of the present invention further provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, any one of the data processing method steps described above is implemented.

本发明实施例提供的数据处理方法及装置,首先,可以接收用户针对第一数据的操作指令,其中,操作指令中携带用户的用户标识信息,然后,根据用户标识信息,确定用户的权限信息,进而,基于权限信息,从第一数据中确定待处理数据,根据操作指令,对待处理数据进行处理。在本方案中,根据用户的用户标识信息,可以确定该用户的权限信息,进而通过权限信息从第一数据中确定出该用户可以处理的待处理数据。可以理解,不同用户可以对应不同的权限信息,这样,即使是具有权限的用户,其能够处理的数据也受到权限信息的限制,难以实现对所有数据的处理,从而提高了数据的安全性。In the data processing method and device provided by the embodiments of the present invention, firstly, an operation instruction of the user for the first data may be received, wherein the operation instruction carries the user identification information of the user, and then, the authority information of the user is determined according to the user identification information, Further, based on the authority information, the data to be processed is determined from the first data, and the data to be processed is processed according to the operation instruction. In this solution, according to the user identification information of the user, the authority information of the user can be determined, and then the to-be-processed data that can be processed by the user can be determined from the first data through the authority information. It can be understood that different users can correspond to different permission information. In this way, even a user with permission can process data limited by permission information, which makes it difficult to process all data, thereby improving data security.

当然,实施本发明的任一产品或方法并不一定需要同时达到以上所述的所有优点。Of course, it is not necessary for any product or method of the present invention to achieve all of the advantages described above at the same time.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to explain the embodiments of the present invention or the technical solutions in the prior art more clearly, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained according to these drawings without creative efforts.

图1为本发明实施例提供的数据处理方法的流程示意图;1 is a schematic flowchart of a data processing method provided by an embodiment of the present invention;

图2为本发明实施例提供的数据处理装置的结构示意图;FIG. 2 is a schematic structural diagram of a data processing apparatus provided by an embodiment of the present invention;

图3为本发明实施例提供的一种电子设备的结构示意图。FIG. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

相关技术中,通常采取仅对特定用户授予操作权限的方式,防止数据泄露。若某一用户未被授予操作权限,则该用户无法对设备中存储的任一数据进行处理。若某一用户被授予操作权限,则该用户可以对设备中的所有数据进行处理。但是,这样将导致被授予操作权限的用户对数据的处理不受限制,数据的安全性不够高。In the related art, the method of granting operation rights only to specific users is usually adopted to prevent data leakage. If a user is not authorized to operate, the user cannot process any data stored in the device. If a user is granted operation rights, the user can process all data in the device. However, this will result in unrestricted data processing by users who have been granted operation rights, and data security is not high enough.

因此,为了解决上述技术问题,本发明实施例提供了一种数据处理方法,该方法可以应用于网络摄像机、硬盘录像机、计算机、服务器、移动终端等电子设备中,具体不做限定。Therefore, in order to solve the above technical problems, the embodiments of the present invention provide a data processing method, which can be applied to electronic devices such as network cameras, hard disk video recorders, computers, servers, and mobile terminals, and is not specifically limited.

下面从总体上对本发明实施例提供的数据处理方法进行说明。The data processing method provided by the embodiments of the present invention is generally described below.

一种实现方式中,上述数据处理方法包括:In one implementation, the above data processing method includes:

接收用户针对第一数据的操作指令,操作指令中携带用户的用户标识信息;receiving an operation instruction from the user for the first data, where the operation instruction carries the user identification information of the user;

根据用户标识信息,确定用户的权限信息;Determine the user's authority information according to the user identification information;

基于权限信息,从第一数据中确定待处理数据;determining the data to be processed from the first data based on the authority information;

根据操作指令,对待处理数据进行处理。According to the operation instruction, the data to be processed is processed.

由以上可见,本发明实施例提供的数据处理方法,根据用户的用户标识信息,可以确定该用户的权限信息,进而通过权限信息从第一数据中确定出该用户可以处理的待处理数据。可以理解,不同用户可以对应不同的权限信息,这样,即使是具有权限的用户,其能够处理的数据也受到权限信息的限制,难以实现对所有数据的处理,从而提高了数据的安全性。As can be seen from the above, the data processing method provided by the embodiment of the present invention can determine the permission information of the user according to the user identification information of the user, and then determine the pending data that the user can process from the first data through the permission information. It can be understood that different users can correspond to different permission information. In this way, even a user with permission can process data limited by permission information, which makes it difficult to process all data, thereby improving data security.

下面将通过具体的实施例,对本发明实施例提供的数据处理方法进行详细描述。The data processing method provided by the embodiment of the present invention will be described in detail below through specific embodiments.

如图1所示,为本发明实施例提供的数据处理方法的流程示意图,包括如下步骤:As shown in FIG. 1, it is a schematic flowchart of a data processing method provided by an embodiment of the present invention, including the following steps:

S101:接收用户针对第一数据的操作指令,其中,操作指令中携带用户的用户标识信息。S101: Receive an operation instruction of a user for the first data, wherein the operation instruction carries user identification information of the user.

本步骤中,操作指令是指用户对第一数据的操作指令,可以是对第一数据的读取、修改、下载等任意一项或多项操作。比如,若第一数据为录像数据,那么,操作指令可以是对录像数据的回放、导出等操作。In this step, the operation instruction refers to an operation instruction of the user on the first data, which may be any one or more operations such as reading, modifying, and downloading the first data. For example, if the first data is video data, the operation instruction may be operations such as playback and export of the video data.

用户的用户标识信息可以为用户所使用的录名或用户密码,也可以是用户的特定标识码,具体不做限定。The user identification information of the user may be a directory name or a user password used by the user, or may be a specific identification code of the user, which is not specifically limited.

一种实现方式中,在接收用户针对第一数据的操作指令之前,可以先对用户的身份进行认证,只有认证成功的用户才能够发送操作指令,而认证失败的用户无法发送操作指令。In an implementation manner, before receiving the user's operation instruction for the first data, the user's identity may be authenticated, and only the user who succeeds in authentication can send the operation instruction, and the user who fails the authentication cannot send the operation instruction.

举例而言,对用户的身份进行认证的方式,可以是对用户进行生物识别,比如,对用户进行人脸识别、指纹识别等。或者,也可以是对用户登录设备进行识别,比如,可以通过识别用户登录设备的IP地址或设备信息,进行用户认证。For example, the way of authenticating the user's identity may be to perform biometric recognition on the user, such as performing face recognition, fingerprint recognition, and the like on the user. Alternatively, it may also identify the user login device, for example, user authentication may be performed by identifying the IP address or device information of the user login device.

另外,在一种实现方式中,也可以通过用户输入的信息对用户的身份进行认证。比如,认证信息可以为用户名及用户名对应的用户密码,那么,在进行用户认证时,可以根据用户输入的用户名及用户密码,判断用户名与用户密码是否匹配,若匹配,则可以判定用户认证成功。In addition, in an implementation manner, the user's identity may also be authenticated through information input by the user. For example, the authentication information can be the user name and the user password corresponding to the user name. Then, when performing user authentication, it can be determined whether the user name and the user password match according to the user name and user password input by the user. User authentication succeeded.

S102:根据用户标识信息,确定用户的权限信息。S102: Determine the authority information of the user according to the user identification information.

其中,用户的权限信息可以为权限开放时间段,也就是说,用户只具备对在该权限开放时间段内采集的数据的处理权限。或者,用户的权限信息也可以为权限开放区域,也就是说,用户只具备针对该权限开放区域采集的数据的处理权限。或者,权限信息也可以为权限开放设备的设备编号,也就是说,用户只具备针对某一个或几个特定设备编号对应的采集设备所采集的数据的处理权限。换句话说,通过用户的权限信息,可以对该用户能够处理的数据的范围进行限制。The user's permission information may be a permission opening time period, that is, the user only has the right to process the data collected during the permission opening time period. Alternatively, the authority information of the user may also be an open authority area, that is, the user only has the processing authority for the data collected in the open authority area. Alternatively, the permission information may also be the device number of the permission-opening device, that is, the user only has the right to process the data collected by the collection device corresponding to one or several specific device numbers. In other words, through the user's permission information, the scope of the data that the user can process can be limited.

可以理解,通常可以为不同的用户配置不同的权限信息。比如,在权限信息为权限开放时间段的情况下,可以将用户1的权限开放时间段配置为周日、周二、周四晚上的8点至第二天早上的8点,将用户2的权限开放时间段配置为周一、周三、周五晚上的8点至第二天早上的8点,将用户3的权限开放时间段配置为周一至周五的上午8点至晚上8点,将用户4的权限开放时间段配置为周六上午8点至周日晚上8点,等等。It can be understood that different permission information can usually be configured for different users. For example, when the permission information is the permission opening time period, the permission opening time period of user 1 can be configured to be from 8:00 pm to 8:00 the next morning on Sunday, Tuesday and Thursday, and the permission of user 2 can be set to The opening time period is configured from 8:00 pm on Monday, Wednesday, and Friday to 8:00 am the next morning; The permission opening hours are configured as Saturday 8am to Sunday 8pm, and so on.

其中,用户的权限信息可以是预先配置的,比如,可以在用户注册时,为其配置对应的权限信息,这样,每一个用户都具备对应的固定的权限信息。The user's permission information may be pre-configured. For example, when the user registers, the corresponding permission information may be configured for the user, so that each user has corresponding fixed permission information.

或者,在一种实现方式中,用户的权限信息也可以是由高权限用户为其他用户配置的。举例而言,在获取到用户输入的用户名及用户密码之后,若判定用户名与用户密码匹配,那么,可以根据用户名与用户密码,判断用户是否为高权限用户。若是,则接收高权限用户输入的权限配置信息,根据权限配置信息,确定高权限用户之外的其他用户的权限信息,建立用户标识信息与权限信息之间的对应关系。Or, in an implementation manner, the user's permission information may also be configured by a high-authority user for other users. For example, after obtaining the user name and user password input by the user, if it is determined that the user name and the user password match, then whether the user is a high-authority user can be determined according to the user name and the user password. If so, the authority configuration information input by the high authority user is received, and according to the authority configuration information, authority information of other users other than the high authority user is determined, and a corresponding relationship between the user identification information and the authority information is established.

这样,每个用户的权限信息可以由高权限用户配置,便于对每个用户的权限信息进行修改。In this way, the authority information of each user can be configured by a high authority user, which facilitates modification of the authority information of each user.

S103:基于权限信息,从第一数据中确定待处理数据。S103: Based on the authority information, determine the data to be processed from the first data.

可以理解,权限信息可以对第一数据的某一属性信息进行限制,从而可以实现基于权限信息对第一数据进行筛选,从中确定待处理数据。It can be understood that the permission information can limit a certain attribute information of the first data, so that the first data can be screened based on the permission information, and the data to be processed can be determined therefrom.

比如,若权限信息为权限开放时间段,那么,首先,可以确定权限开放时间段与第一数据的采集时间段之间的重合时间段,然后,从第一数据中选择在重合时间段内采集的数据,作为待处理数据。For example, if the permission information is the permission opening time period, then, firstly, the overlapping time period between the permission opening time period and the collection time period of the first data can be determined, and then the first data is selected to be collected within the overlapping time period. data as pending data.

或者,若权限信息为权限开放区域,那么,首先,可以根据第一数据的采集地点,确定在权限开放区域内的重合采集地点,然后,从第一数据中选择在重合采集地点采集的数据,作为待处理数据。Or, if the authority information is an open authority area, then, firstly, according to the collection location of the first data, a coincident collection location within the authority open area may be determined, and then, the data collected at the coincident collection location may be selected from the first data, as the data to be processed.

或者,若权限信息为权限开放设备的设备编号,那么,可以根据权限开放设备的设备编号,从第一数据中确定这些权限开放设备采集的数据,作为待处理数据。Alternatively, if the authority information is the device number of the authority-opening device, then the data collected by the authority-opening device may be determined from the first data as the data to be processed according to the device number of the authority-opening device.

S104:根据操作指令,对待处理数据进行处理。S104: Process the data to be processed according to the operation instruction.

一种实现方式中,若操作指令为数据下载指令,那么,首先,可以根据用户标识信息,确定用户对应的加密信息,根据加密信息,对待处理数据进行加密,然后,下载加密后的待处理数据。这样,下载得到的数据是加密后的数据,需要获知加密信息对应的解密信息,才能够进一步进行处理,进而提高了数据的安全性。In an implementation manner, if the operation instruction is a data download instruction, then, first, the encrypted information corresponding to the user can be determined according to the user identification information, the data to be processed is encrypted according to the encrypted information, and then the encrypted data to be processed is downloaded. . In this way, the downloaded data is encrypted data, and it is necessary to know the decryption information corresponding to the encrypted information before further processing can be performed, thereby improving the security of the data.

其中,加密信息可以为用户的用户名或用户密码,也可以是预先约定好的密码,具体不做限定。The encrypted information may be the user's user name or user password, or may be a pre-agreed password, which is not specifically limited.

举例而言,在操作指令为数据搜索指令、权限信息为权限开放时间段的情况下,若用户1权限开放时间段为周日、周二、周四晚上的8点至第二天早上的8点,那么,用户1只能搜索到权限开放时间段内采集的数据,其他时间段内采集的数据不会显示在用户1的搜索结果中。For example, when the operation instruction is a data search instruction and the permission information is the permission opening time period, if the permission opening time period of User 1 is Sunday, Tuesday, and Thursday from 8:00 pm to 8:00 the next morning , then, user 1 can only search for data collected during the time period when the authority is open, and data collected during other time periods will not be displayed in the search results of user 1.

由以上可见,本发明实施例提供的数据处理方法,根据用户的用户标识信息,可以确定该用户的权限信息,进而通过权限信息从第一数据中确定出该用户可以处理的待处理数据。可以理解,不同用户可以对应不同的权限信息,这样,即使是具有权限的用户,其能够处理的数据也受到权限信息的限制,难以实现对所有数据的处理,从而提高了数据的安全性。As can be seen from the above, the data processing method provided by the embodiment of the present invention can determine the permission information of the user according to the user identification information of the user, and then determine the pending data that the user can process from the first data through the permission information. It can be understood that different users can correspond to different permission information. In this way, even a user with permission can process data limited by permission information, which makes it difficult to process all data, thereby improving data security.

如图2所示,本发明实施例还提供了一种数据处理装置,该装置包括:As shown in FIG. 2, an embodiment of the present invention further provides a data processing apparatus, the apparatus includes:

接收模块201,用于接收用户针对第一数据的操作指令,操作指令中携带用户的用户标识信息;A receiving module 201, configured to receive an operation instruction of a user for the first data, where the operation instruction carries the user identification information of the user;

确定模块202,用于根据用户标识信息,确定用户的权限信息;A determination module 202, configured to determine the authority information of the user according to the user identification information;

选择模块203,用于基于权限信息,从第一数据中确定待处理数据;A selection module 203, configured to determine the data to be processed from the first data based on the authority information;

处理模块204,用于根据操作指令,对待处理数据进行处理。The processing module 204 is configured to process the data to be processed according to the operation instruction.

一种实现方式中,装置还包括:In an implementation manner, the device further includes:

认证模块205,用于获取用户输入的用户名及用户密码;判断用户名与用户密码是否匹配;若匹配,则判定用户认证成功,触发接收模块201。The authentication module 205 is configured to obtain the user name and user password input by the user; determine whether the user name and the user password match; if they match, determine that the user authentication is successful, and trigger the receiving module 201 .

一种实现方式中,装置还包括:In an implementation manner, the device further includes:

判断模块(图中未示出),用于根据用户名与用户密码,判断用户是否为高权限用户;若是,则触发配置模块(图中未示出);Judging module (not shown in the figure), used to judge whether the user is a high-authority user according to the user name and the user password; if so, trigger the configuration module (not shown in the figure);

配置模块(图中未示出),用于接收高权限用户输入的权限配置信息,根据权限配置信息,确定高权限用户之外的其他用户的权限信息,建立用户标识信息与权限信息之间的对应关系;The configuration module (not shown in the figure) is used to receive the authority configuration information input by the high-authority user, according to the authority configuration information, determine the authority information of other users other than the high-authority user, and establish the relationship between the user identification information and the authority information. Correspondence;

确定模块202,具体用于根据用户标识信息,从所建立的用户标识信息与权限信息之间的对应关系中,查询用户的权限信息。The determining module 202 is specifically configured to, according to the user identification information, query the user's authority information from the established correspondence between the user identification information and the authority information.

一种实现方式中,权限信息为权限开放时间段;选择模块203,具体用于:In an implementation manner, the permission information is the permission opening time period; the selection module 203 is specifically used for:

确定权限开放时间段与第一数据的采集时间段之间的重合时间段;determining the overlapping time period between the permission opening time period and the collection time period of the first data;

从第一数据中选择在重合时间段内采集的数据,作为待处理数据。The data collected in the overlapping time period is selected from the first data as the data to be processed.

一种实现方式中,操作指令为数据下载指令;处理模块204,具体用于:In an implementation manner, the operation instruction is a data download instruction; the processing module 204 is specifically used for:

根据用户标识信息,确定用户对应的加密信息;Determine the encrypted information corresponding to the user according to the user identification information;

根据加密信息,对待处理数据进行加密,下载加密后的待处理数据。According to the encrypted information, the data to be processed is encrypted, and the encrypted data to be processed is downloaded.

由以上可见,本发明实施例提供的数据处理装置,根据用户的用户标识信息,可以确定该用户的权限信息,进而通过权限信息从第一数据中确定出该用户可以处理的待处理数据。可以理解,不同用户可以对应不同的权限信息,这样,即使是具有权限的用户,其能够处理的数据也受到权限信息的限制,难以实现对所有数据的处理,从而提高了数据的安全性。As can be seen from the above, the data processing apparatus provided by the embodiment of the present invention can determine the permission information of the user according to the user identification information of the user, and then determine the pending data that the user can process from the first data through the permission information. It can be understood that different users can correspond to different permission information. In this way, even a user with permission can process data limited by permission information, which makes it difficult to process all data, thereby improving data security.

本发明实施例还提供了一种电子设备,如图3所示,包括处理器301、通信接口302、存储器303和通信总线304,其中,处理器301,通信接口302,存储器303通过通信总线304完成相互间的通信,An embodiment of the present invention further provides an electronic device, as shown in FIG. 3 , including a processor 301 , a communication interface 302 , a memory 303 and a communication bus 304 , wherein the processor 301 , the communication interface 302 , and the memory 303 pass through the communication bus 304 complete communication with each other,

存储器303,用于存放计算机程序;a memory 303 for storing computer programs;

处理器301,用于执行存储器303上所存放的程序时,实现如下步骤:When the processor 301 is used to execute the program stored in the memory 303, the following steps are implemented:

接收用户针对第一数据的操作指令,操作指令中携带用户的用户标识信息;receiving an operation instruction from the user for the first data, where the operation instruction carries the user identification information of the user;

根据用户标识信息,确定用户的权限信息;Determine the user's authority information according to the user identification information;

基于权限信息,从第一数据中确定待处理数据;determining the data to be processed from the first data based on the authority information;

根据操作指令,对待处理数据进行处理。According to the operation instruction, the data to be processed is processed.

上述电子设备提到的通信总线可以是外设部件互连标准(Peripheral ComponentInterconnect,PCI)总线或扩展工业标准结构(Extended Industry StandardArchitecture,EISA)总线等。该通信总线可以分为地址总线、数据总线、控制总线等。为便于表示,图中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The communication bus mentioned in the above electronic device may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus or the like. The communication bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.

通信接口用于上述电子设备与其他设备之间的通信。The communication interface is used for communication between the above electronic device and other devices.

存储器可以包括随机存取存储器(Random Access Memory,RAM),也可以包括非易失性存储器(Non-Volatile Memory,NVM),例如至少一个磁盘存储器。可选的,存储器还可以是至少一个位于远离前述处理器的存储装置。The memory may include random access memory (Random Access Memory, RAM), and may also include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk memory. Optionally, the memory may also be at least one storage device located away from the aforementioned processor.

上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital SignalProcessing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。The above-mentioned processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; may also be a digital signal processor (Digital Signal Processing, DSP), an application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.

由以上可见,本发明实施例提供的数据处理方法,根据用户的用户标识信息,可以确定该用户的权限信息,进而通过权限信息从第一数据中确定出该用户可以处理的待处理数据。可以理解,不同用户可以对应不同的权限信息,这样,即使是具有权限的用户,其能够处理的数据也受到权限信息的限制,难以实现对所有数据的处理,从而提高了数据的安全性。As can be seen from the above, the data processing method provided by the embodiment of the present invention can determine the permission information of the user according to the user identification information of the user, and then determine the pending data that the user can process from the first data through the permission information. It can be understood that different users can correspond to different permission information. In this way, even a user with permission can process data limited by permission information, which makes it difficult to process all data, thereby improving data security.

在本发明提供的又一实施例中,还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述实施例中任一所述的数据处理方法。In yet another embodiment provided by the present invention, a computer-readable storage medium is also provided, where instructions are stored in the computer-readable storage medium, when the computer-readable storage medium is run on a computer, the computer is made to execute any one of the above-mentioned embodiments. the data processing method.

在本发明提供的又一实施例中,还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述实施例中任一所述的数据处理方法。In yet another embodiment provided by the present invention, there is also provided a computer program product containing instructions, which, when run on a computer, causes the computer to execute the data processing method described in any of the foregoing embodiments.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。In the above-mentioned embodiments, it may be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that includes an integration of one or more available media. The usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media (eg, Solid State Disk (SSD)), among others.

需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。It should be noted that, in this document, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any relationship between these entities or operations. any such actual relationship or sequence exists. Moreover, the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device that includes a list of elements includes not only those elements, but also includes not explicitly listed or other elements inherent to such a process, method, article or apparatus. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in a process, method, article or apparatus that includes the element.

本说明书中的各个实施例均采用相关的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置实施例、电子设备实施例和存储介质实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a related manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the apparatus embodiment, the electronic device embodiment and the storage medium embodiment, since they are basically similar to the method embodiment, the description is relatively simple.

以上所述仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内所作的任何修改、等同替换、改进等,均包含在本发明的保护范围内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (12)

1. A method of data processing, the method comprising:
receiving an operation instruction of a user for first data, wherein the operation instruction carries user identification information of the user;
determining the authority information of the user according to the user identification information;
determining data to be processed from the first data based on the authority information;
and processing the data to be processed according to the operation instruction.
2. The method of claim 1, wherein prior to the receiving the user operation instruction for the first data, the method further comprises:
acquiring a user name and a user password input by a user;
judging whether the user name is matched with the user password;
and if the first data is matched with the second data, judging that the user authentication is successful, and executing the step of receiving the operation instruction of the user for the first data.
3. The method of claim 2, wherein in the event that the username is determined to match the user password, the method further comprises:
judging whether the user is a high-authority user or not according to the user name and the user password;
if so, receiving authority configuration information input by the high-authority user, determining authority information of other users except the high-authority user according to the authority configuration information, and establishing a corresponding relation between user identification information and the authority information;
determining the authority information of the user according to the user identification information comprises the following steps:
and inquiring the authority information of the user from the established corresponding relation between the user identification information and the authority information according to the user identification information.
4. The method according to claim 1, wherein the right information is a right open period; the determining the data to be processed from the first data based on the authority information comprises:
determining a coincidence time period between the permission opening time period and the acquisition time period of the first data;
and selecting the data collected in the coincidence time period from the first data as the data to be processed.
5. The method of claim 1, wherein the operation instruction is a data download instruction; the processing the data to be processed according to the operation instruction comprises:
according to the user identification information, determining encryption information corresponding to the user;
and encrypting the data to be processed according to the encryption information, and downloading the encrypted data to be processed.
6. A data processing apparatus, characterized in that the apparatus comprises:
the receiving module is used for receiving an operation instruction of a user for first data, wherein the operation instruction carries user identification information of the user;
the determining module is used for determining the authority information of the user according to the user identification information;
the selection module is used for determining data to be processed from the first data based on the authority information;
and the processing module is used for processing the data to be processed according to the operation instruction.
7. The apparatus of claim 6, further comprising:
the authentication module is used for acquiring a user name and a user password input by a user; judging whether the user name is matched with the user password; if the user authentication is matched with the user authentication, the user authentication is judged to be successful, and the receiving module is triggered.
8. The apparatus of claim 7, further comprising:
the judging module is used for judging whether the user is a high-authority user or not according to the user name and the user password; if yes, triggering a configuration module;
the configuration module is used for receiving the authority configuration information input by the high-authority user, determining the authority information of other users except the high-authority user according to the authority configuration information, and establishing the corresponding relation between the user identification information and the authority information;
the determining module is specifically configured to query the authority information of the user from the established correspondence between the user identification information and the authority information according to the user identification information.
9. The apparatus of claim 6, wherein the permission information is a permission open period; the selection module is specifically configured to:
determining a coincidence time period between the permission opening time period and the acquisition time period of the first data;
and selecting the data collected in the coincidence time period from the first data as the data to be processed.
10. The apparatus of claim 6, wherein the operation instruction is a data download instruction; the processing module is specifically configured to:
according to the user identification information, determining encryption information corresponding to the user;
and encrypting the data to be processed according to the encryption information, and downloading the encrypted data to be processed.
11. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1 to 5 when executing a program stored in the memory.
12. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 1-5.
CN201910418985.2A 2019-05-20 2019-05-20 Data processing method and device Pending CN111966996A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910418985.2A CN111966996A (en) 2019-05-20 2019-05-20 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910418985.2A CN111966996A (en) 2019-05-20 2019-05-20 Data processing method and device

Publications (1)

Publication Number Publication Date
CN111966996A true CN111966996A (en) 2020-11-20

Family

ID=73358202

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910418985.2A Pending CN111966996A (en) 2019-05-20 2019-05-20 Data processing method and device

Country Status (1)

Country Link
CN (1) CN111966996A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113286170A (en) * 2020-12-11 2021-08-20 苏州律点信息科技有限公司 Video content analysis method and device and cloud server
CN114385998A (en) * 2022-01-14 2022-04-22 北京金山云网络技术有限公司 Function use permission processing method and device and electronic equipment
CN114722412A (en) * 2022-04-15 2022-07-08 北京科杰科技有限公司 Data security storage method and device, electronic equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070283447A1 (en) * 2006-06-05 2007-12-06 Jiang Hong Managing access to a document-processing device using an identification token
CN102724038A (en) * 2011-03-30 2012-10-10 阿里巴巴集团控股有限公司 Identity authentication method, information acquisition device, and identity authentication device
CN103078859A (en) * 2012-12-31 2013-05-01 普天新能源有限责任公司 Service system authority management method, equipment and system
CN104967875A (en) * 2015-07-28 2015-10-07 浙江宇视科技有限公司 Method and device for controlling monitoring video checking authority
CN105488366A (en) * 2014-10-13 2016-04-13 阿里巴巴集团控股有限公司 Data permission control method and system
US20160117521A1 (en) * 2014-05-12 2016-04-28 CompuGroup Medical AG Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
CN105703978A (en) * 2014-11-24 2016-06-22 武汉物联远科技有限公司 Smart home control system and method
CN107277038A (en) * 2017-07-18 2017-10-20 北京微影时代科技有限公司 Access control method, device and system
CN108256340A (en) * 2017-12-22 2018-07-06 中国平安人寿保险股份有限公司 Collecting method, device, terminal device and storage medium
CN109409119A (en) * 2017-08-17 2019-03-01 北京京东尚科信息技术有限公司 Data manipulation method and device
CN109635581A (en) * 2018-12-12 2019-04-16 深圳市网心科技有限公司 A kind of data processing method, equipment, system and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070283447A1 (en) * 2006-06-05 2007-12-06 Jiang Hong Managing access to a document-processing device using an identification token
CN102724038A (en) * 2011-03-30 2012-10-10 阿里巴巴集团控股有限公司 Identity authentication method, information acquisition device, and identity authentication device
CN103078859A (en) * 2012-12-31 2013-05-01 普天新能源有限责任公司 Service system authority management method, equipment and system
US20160117521A1 (en) * 2014-05-12 2016-04-28 CompuGroup Medical AG Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
CN105488366A (en) * 2014-10-13 2016-04-13 阿里巴巴集团控股有限公司 Data permission control method and system
CN105703978A (en) * 2014-11-24 2016-06-22 武汉物联远科技有限公司 Smart home control system and method
CN104967875A (en) * 2015-07-28 2015-10-07 浙江宇视科技有限公司 Method and device for controlling monitoring video checking authority
CN107277038A (en) * 2017-07-18 2017-10-20 北京微影时代科技有限公司 Access control method, device and system
CN109409119A (en) * 2017-08-17 2019-03-01 北京京东尚科信息技术有限公司 Data manipulation method and device
CN108256340A (en) * 2017-12-22 2018-07-06 中国平安人寿保险股份有限公司 Collecting method, device, terminal device and storage medium
CN109635581A (en) * 2018-12-12 2019-04-16 深圳市网心科技有限公司 A kind of data processing method, equipment, system and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113286170A (en) * 2020-12-11 2021-08-20 苏州律点信息科技有限公司 Video content analysis method and device and cloud server
CN114385998A (en) * 2022-01-14 2022-04-22 北京金山云网络技术有限公司 Function use permission processing method and device and electronic equipment
CN114722412A (en) * 2022-04-15 2022-07-08 北京科杰科技有限公司 Data security storage method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US12160420B1 (en) Public authentication systems and methods
CN110463161B (en) Password state machine for accessing protected resources
JP6166749B2 (en) Context-based data access control
US7571473B1 (en) Identity management system and method
US7783891B2 (en) System and method facilitating secure credential management
CN112513857A (en) Personalized cryptographic security access control in a trusted execution environment
US20150033306A1 (en) Apparatus and method for system user authentication
WO2015047992A2 (en) Device identification scoring
WO2020181809A1 (en) Data processing method and system based on interface checking, and computer device
WO2017211199A1 (en) Method and device for identity authentication
US10333707B1 (en) Systems and methods for user authentication
CN113704826A (en) Privacy protection-based business risk detection method, device and equipment
CN111966996A (en) Data processing method and device
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN113239853B (en) Biological identification method, device and equipment based on privacy protection
WO2020062974A1 (en) Method and apparatus for acquiring blockchain private key, and electronic device
CN112039878A (en) Equipment registration method and device, computer equipment and storage medium
CN115361216A (en) Authorized login method, device, electronic equipment and storage medium
CN113761498A (en) Third party login information hosting method, system, equipment and storage medium
CN112398787B (en) Mailbox login verification method and device, computer equipment and storage medium
CN111600882A (en) Block chain-based account password management method and device and electronic equipment
US10803155B2 (en) Method and system for preventing unauthorized computer processing
CN111090850B (en) Authentication system, method and device
CN113609504A (en) Data processing method, device and system, electronic equipment and storage medium
KR101636802B1 (en) File management method and system for preventing security incident by portable memory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201120

RJ01 Rejection of invention patent application after publication