CN112214756A - Authority management system, method and storage medium of consumption machine - Google Patents

Authority management system, method and storage medium of consumption machine Download PDF

Info

Publication number
CN112214756A
CN112214756A CN202010985659.2A CN202010985659A CN112214756A CN 112214756 A CN112214756 A CN 112214756A CN 202010985659 A CN202010985659 A CN 202010985659A CN 112214756 A CN112214756 A CN 112214756A
Authority
CN
China
Prior art keywords
authority
user
information
interface
consumer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010985659.2A
Other languages
Chinese (zh)
Inventor
贺月路
傅观骏
钟水盈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heshi Office Equipments Co ltd
Original Assignee
Heshi Office Equipments Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heshi Office Equipments Co ltd filed Critical Heshi Office Equipments Co ltd
Priority to CN202010985659.2A priority Critical patent/CN112214756A/en
Publication of CN112214756A publication Critical patent/CN112214756A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention discloses a system, a method and a storage medium for managing the authority of a consumption machine; the authority management system comprises a role granting module used for granting corresponding roles to login users; the authority configuration module is used for setting authority for configuring a corresponding consumption machine interface by a user; the authority database module is used for storing the information of each role and the authority information corresponding to each role; and the authority authentication module is used for acquiring the information of the user and performing authority authentication according to the authority information. By setting the authority management system, the consumption machine can be used in an authorized manner, some professionals or operators can be appointed to make corresponding modification on some functions of the consumption machine, the problems of data confusion, communication failure, change of transaction flow and the like caused by random operation of other people on the consumption machine can be effectively avoided, non-working personnel can be prevented from using the consumption machine illegally and maliciously, and economic loss is avoided. The invention can be widely applied to the technical field of consumer machine authority management.

Description

Authority management system, method and storage medium of consumption machine
Technical Field
The invention relates to the technical field of authority management, in particular to an authority management system, an authority management method and a storage medium of a consumer machine.
Background
The authority management generally refers to that a user can access and only can access the authorized resources according to the security rules or security policies set by the system. Because the existing consumer computer is not provided with corresponding authority management, sensitive setting items (such as parameters of internet access and serial communication, machine time, factory reset, language setting and the like) in a menu interface or a function setting interface are likely to be changed randomly in the using process, and further, the results of data confusion, communication failure, change of transaction flow and the like in the consumer computer are caused.
Disclosure of Invention
In order to solve at least one of the above technical problems, an object of the present invention is to provide a rights management system, a method and a storage medium for a consumer machine.
The technical scheme adopted by the invention is as follows: in one aspect, an embodiment of the present invention provides a rights management system for a consumer machine, including:
the role granting module is used for granting at least one role to the user;
the authority configuration module is used for setting authority for configuring a corresponding consumption machine interface by a user;
the authority database module is used for storing the information of each role and the authority information corresponding to each role;
and the authority authentication module is used for acquiring the information of the user and performing authority authentication according to the authority information.
Further, the rights management system further includes:
and the authority management module is used for displaying a corresponding consumer machine setting interface to the user after the user passes the authentication, wherein the consumer machine setting interface comprises a menu setting interface and a function setting interface.
Further, the roles include at least one of:
security administrator, system engineer, configuration engineer, super operator, general operator.
Further, the permission database module comprises a sub-library unit, the sub-library unit is used for storing a permission list corresponding to the user login account, the permission list displays specific permission information under a corresponding role, and the permission information comprises interface login permission and interface data modification permission.
On the other hand, the embodiment of the invention also comprises a right management method of the consuming machine, which comprises the following steps:
acquiring user information, wherein the user information comprises a user login account and a password;
calling the information stored in the authority database module;
performing authority authentication on the user according to the information stored in the authority database module;
and displaying a corresponding consumer machine setting interface according to the authentication result, wherein the consumer machine setting interface comprises a menu setting interface and a function setting interface.
Further, the step of retrieving information stored in the permission database module specifically includes:
detecting whether a display interface of a consumption machine jumps to a setting interface of the consumption machine or not;
when the display interface of the consumption machine is detected to jump to the setting interface of the consumption machine, calling the information stored in the permission database module;
and when detecting that the display interface of the consumer computer is not jumped to the setting interface of the consumer computer, not performing authority authentication on the user.
Further, according to the information stored in the permission database module, the step of performing permission authentication on the user specifically includes:
identifying user information, wherein the user information comprises a user login account and a password;
searching the user information and the authority information corresponding to the user in an authority database module;
and authenticating the user according to the user information and the authority information corresponding to the user.
And further, when the user information cannot be identified, jumping to a user information login interface.
Further, when the authentication fails, jumping out of a prompt interface of the login failure or popping up a reminding window without setting authority.
In another aspect, the present invention further includes a storage medium, and the processor-executable program is configured to execute the method for managing rights of a consumer machine when executed by a processor.
The invention has the beneficial effects that: by setting the authority management system, the consumption machine can be used in an authorized manner, some professionals or operators can be appointed to make corresponding modification on some functions of the consumption machine, the problems of data confusion, communication failure, change of transaction flow and the like caused by random operation of other people on the consumption machine can be effectively avoided, non-working personnel can be prevented from using the consumption machine illegally and maliciously, and economic loss is avoided.
Drawings
FIG. 1 is a block diagram of a consumer machine rights management system in accordance with an embodiment of the present invention;
FIG. 2 is a flowchart illustrating operation of a consumer machine for setting item modification according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps of a method for managing rights of a consumer machine according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention designs the consumer machine authority management system through the upper computer software, and applies the consumer machine authority management system to the consumer machine through the communication mode of the network port or the serial port. As shown in fig. 1, the rights management system of the consumer machine includes:
the role granting module is used for granting at least one role to the user;
the authority configuration module is used for setting authority for configuring a corresponding consumption machine interface by a user;
the authority database module is used for storing the information of each role and the authority information corresponding to each role;
and the authority authentication module is used for acquiring the information of the user and performing authority authentication according to the authority information.
Further, the rights management system further includes:
and the authority management module is used for displaying a corresponding consumer machine setting interface to the user after the user passes the authentication, wherein the consumer machine setting interface comprises a menu setting interface and a function setting interface.
Further, the roles include at least one of:
security administrator, system engineer, configuration engineer, super operator, general operator.
Further, the permission database module comprises a sub-library unit, the sub-library unit is used for storing a permission list corresponding to the user login account, the permission list displays specific permission information under a corresponding role, and the permission information comprises interface login permission and interface data modification permission.
In this embodiment, information of the operator needs to be added to the upper computer software, and the information is mainly used for setting numbers for different operators and granting corresponding roles to the operators, and each role is reset with corresponding authority. In the embodiment, the set authority comprises an interface login authority and an interface data modification authority; the interface login authority comprises a consumer machine menu interface login authority and a consumer machine function setting interface login authority, and the interface data modification authority comprises a consumer machine menu interface data modification authority and a consumer machine function setting interface data modification authority. The type of the role is determined, the authority range of each role is also determined, generally, the roles are divided into a security manager, a system engineer, a configuration engineer, a super operator, a common operator and the like, the authority range of the role of the security manager is the related authority of creating the role of a user, the corresponding authority of the role and the like, the authority range of the configuration engineer is the related authority of the configuration project, and the authority ranges of the super operator and the common operator are the authorities of operation control and the like. The user's scope of authority is related to his role. And if the user is a common operator, setting the authority of the user in the authority range corresponding to the common operator. And then storing the set user number, role and corresponding authority into an authority database module. Specifically, the authority settings for the operator may be as shown in table 1:
table 1 permission setting situation table
Figure BDA0002689109540000031
Figure BDA0002689109540000041
As shown in table 1, the super operator may have both an interface login authority and an interface data modification authority, that is, may log in the menu interface and modify data in the menu interface, or may log in the function setting interface and modify data in the function setting interface, such as user 0001 and user 0002; however, some of the ordinary operators only have interface login permission, that is, only can log in a menu interface or a function setting interface to check corresponding settings, but cannot make modifications or changes, such as the user 1002; some devices have login authority of a menu interface and a function setting interface, but only have data modification authority of the function setting interface, but do not have data modification authority of the menu interface, that is, only data in the function setting interface can be modified or changed, and data in the menu interface cannot be modified or changed, for example, a user 1001.
Further, as an optional specific implementation manner, each role in the authority database module corresponds to one sub-library, as shown in table 2, after the authority of the user corresponding to the role is determined, an authority table corresponding to the user name (which may be the same name) is created in the sub-library corresponding to the role, and specific authority information of the user under the role is stored in the authority table.
TABLE 2
Figure BDA0002689109540000042
Taking an operator 0001 as an example, an authority table named super operator is created in an operator sub-library, and an operation ID, an operable device ID and specific operation authority of the operator are set in the table, wherein the operation of the operator comprises entering a certain interface and modifying data of the certain interface, the operable device comprises an upper computer and a consumer, and the specific operation authority comprises role modification authority, authority setting modification authority, authority range modification authority, authority configuration modification authority, operation control authority on the consumer and the like. As shown in table 3:
TABLE 3
Operation ID Device ID Operation authority ID
2541 7859 255
1479 7125 255
Specifically, the operation flow when the setting item of the consumer machine is to be modified is shown in fig. 2, and the consumer machine authority management system can be set to be in two modes of requiring startup login and not requiring startup login; when the consumer computer is in a starting-up login mode, jumping to a user login interface after the consumer computer is started up so that an operator can input a number (or an account number) and a password to log in; when the mode does not need the startup login mode, the main interface is directly displayed after the consumption machine is started. In the startup login mode, a user jumps to a main interface after login is successful, and the main interface displays a menu key, a function key and a return key; when a user presses a 'menu' key or a 'function' key, the system can judge whether the user logs in at present, at the moment, if the user does not need a startup login mode, the system can judge that the user does not log in at present, and jump to a user login interface for an operator to input a number (or an account) and a password for login, and after the user logs in successfully, user information is obtained; if the user needs to be logged in, the system can judge that the user logs in currently, and then the user information is directly acquired. According to the acquired user information, calling data stored in a permission database, and according to the information stored in the permission database module, performing permission authentication on the user; and displaying a corresponding setting interface according to the authentication result, wherein the setting interface comprises a menu setting interface and a function setting interface. Specifically, referring to fig. 3, a rights management method of a consumer machine includes:
s1, obtaining user information, wherein the user information comprises a user login account and a password;
s2, calling information stored in the authority database module;
s3, performing authority authentication on the user according to the information stored in the authority database module;
and S4, displaying a corresponding consumer machine setting interface according to the authentication result, wherein the consumer machine setting interface comprises a menu setting interface and a function setting interface.
Specifically, the step S2, that is, the step of retrieving the information stored in the permission database module, includes:
s201, detecting whether a display interface of a consumption machine jumps to a setting interface of the consumption machine;
s201-1, when detecting that the display interface of the consumer computer skips to the setting interface of the consumer computer, calling the information stored in the permission database module;
s201-2, when the display interface of the consumer computer is detected not to jump to the setting interface of the consumer computer, the authority of the user is not authenticated.
In this embodiment, when it is detected that the "menu" key or the "function" key is clicked, it indicates that the display interface of the consumer computer is to jump to the setting interface, that is, to jump to the menu interface or the function setting interface; and if the 'menu' key or the 'function' key is not detected to be clicked, the fact that the corresponding interface login authority authentication of the user is not needed is shown.
Step S3, namely, the step of performing the authority authentication on the user according to the information stored in the authority database module specifically includes:
s301, identifying user information, wherein the user information comprises a user login account and a password;
s302, searching the user information and the authority information corresponding to the user in an authority database module;
and S303, authenticating the user according to the user information and the authority information corresponding to the user.
In this embodiment, the authority setting table or the role authority table stored in the authority database module may be taken out in an adjustable manner, and whether the user has a corresponding operation authority is searched. Specifically, whether the information of the user is stored in the permission database module is searched, and if not, the user is judged not to have the login interface permission and the interface data modification permission. And if the information of the user is stored in the authority database module, calling the role corresponding to the user and the authority information of the user, authenticating the user according to the authority information, jumping to a corresponding interface for the user to operate after the authentication is passed, and jumping out a prompt interface of login failure or popping up a prompt window without setting authority when the authentication is failed. For example, the authority management system detects that a 'menu' key is clicked, at this time, identifies the information of the login user, obtains the account number 1001 of the login user, calls out an authority setting table or a role authority table stored in an authority database module, and searches whether the user 1001 has a corresponding operation authority, that is, whether the user has the authority to login the menu interface, if so, jumps to the menu interface, and if not, jumps to a prompt interface with login failure. Assuming that the user 1001 has the authority to log in the menu interface, the user 1001 successfully logs in the menu interface, at this time, if it is detected that the user 1001 needs to modify data in the menu interface, such as resetting parameters of internet access and serial port communication, the role corresponding to the user and the authority information are further called, and the user is authenticated according to the authority information, at this time, if the user 1001 has the authority to modify the menu interface data, the parameters of internet access and serial port communication can be reset, and if the user 1001 does not have the authority to modify the menu interface data, a reminding window without the authority is popped up.
In summary, the rights management system and method of the consumer machine in this embodiment have the following advantages:
the embodiment of the invention can use the consumption machine with permission by setting the permission management system, can appoint part of professionals or operators to correspondingly modify some functions of the consumption machine, can effectively avoid the problems of data confusion, communication failure, change of transaction flow and the like caused by random operation of other people on the consumption machine, can also prevent non-working personnel from illegally and maliciously using the consumption machine, and avoids economic loss.
In another aspect, the present invention further includes a storage medium, and the processor executable program is configured to execute the method for managing rights of a consumer machine according to the embodiment when executed by the processor.
The memory may also be separately produced and used to store a computer program corresponding to the consumer machine rights management method. When the memory is connected with the processor, the stored computer program is read out by the processor and executed, so that the consumer machine authority management method is implemented, and the technical effect described in the embodiment is achieved.
It should be noted that, unless otherwise specified, when a feature is referred to as being "fixed" or "connected" to another feature, it may be directly fixed or connected to the other feature or indirectly fixed or connected to the other feature. Furthermore, the descriptions of upper, lower, left, right, etc. used in the present disclosure are only relative to the mutual positional relationship of the constituent parts of the present disclosure in the drawings. As used in this disclosure, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. In addition, unless defined otherwise, all technical and scientific terms used in this example have the same meaning as commonly understood by one of ordinary skill in the art. The terminology used in the description of the embodiments herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this embodiment, the term "and/or" includes any combination of one or more of the associated listed items.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element of the same type from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present disclosure. The use of any and all examples, or exemplary language ("e.g.," such as "or the like") provided with this embodiment is intended merely to better illuminate embodiments of the invention and does not pose a limitation on the scope of the invention unless otherwise claimed.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, operations of processes described in this embodiment can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described in this embodiment (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described in this embodiment includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
A computer program can be applied to input data to perform the functions described in the present embodiment to convert the input data to generate output data that is stored to a non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and any modifications, equivalent substitutions, improvements, etc. within the spirit and principle of the present invention should be included in the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (10)

1. A rights management system for a consumer machine, comprising:
the role granting module is used for granting at least one role to the user;
the authority configuration module is used for setting authority for configuring a corresponding consumption machine interface by a user;
the authority database module is used for storing the information of each role and the authority information corresponding to each role;
and the authority authentication module is used for acquiring the information of the user and performing authority authentication according to the authority information.
2. The rights management system of a consumer machine of claim 1, further comprising:
and the authority management module is used for displaying a corresponding consumer machine setting interface to the user after the user passes the authentication, wherein the consumer machine setting interface comprises a menu setting interface and a function setting interface.
3. The rights management system of a consumer machine of claim 1, wherein the role comprises at least one of:
security administrator, system engineer, configuration engineer, super operator, general operator.
4. The privilege management system of a consumer machine according to claim 1, wherein the privilege database module comprises a sub-library unit, the sub-library unit is used for storing a privilege table corresponding to a user login account, the privilege table displays specific privilege information under a corresponding role, and the privilege information comprises interface login privileges and interface data modification privileges.
5. A method for rights management of a consumer machine, comprising:
acquiring user information, wherein the user information comprises a user login account and a password;
retrieving information stored in a rights database module of a rights management system according to any of claims 1-4;
performing authority authentication on the user according to the information stored in the authority database module;
and displaying a corresponding consumer machine setting interface according to the authentication result, wherein the consumer machine setting interface comprises a menu setting interface and a function setting interface.
6. The rights management method of a consumer machine according to claim 5, wherein the step of retrieving the information stored in the rights database module of the rights management system according to any one of claims 1 to 4 specifically comprises:
detecting whether a display interface of a consumption machine jumps to a setting interface of the consumption machine or not;
when detecting that the display interface of the consumer computer jumps to the setting interface of the consumer computer, calling the information stored in the authority database module of the authority management system of any one of claims 1-4;
and when detecting that the display interface of the consumer computer is not jumped to the setting interface of the consumer computer, not performing authority authentication on the user.
7. The method for managing rights of a consumer machine according to claim 5, wherein the step of authenticating the rights of the user according to the information stored in the rights database module specifically comprises:
identifying user information, wherein the user information comprises a user login account and a password;
searching the user information and the authority information corresponding to the user in an authority database module;
and authenticating the user according to the user information and the authority information corresponding to the user.
8. The rights management method of a consumer machine according to claim 7, wherein when the user information is not recognized, jumping to a user information login interface.
9. The rights management method of claim 7, wherein when the authentication fails, jumping to a prompt interface of login failure or popping up a reminder window without setting rights.
10. A storage medium having stored therein a processor-executable program, the processor-executable program being adapted to perform a method of rights management of a consumer machine according to any one of claims 5-8 when executed by a processor.
CN202010985659.2A 2020-09-18 2020-09-18 Authority management system, method and storage medium of consumption machine Pending CN112214756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010985659.2A CN112214756A (en) 2020-09-18 2020-09-18 Authority management system, method and storage medium of consumption machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010985659.2A CN112214756A (en) 2020-09-18 2020-09-18 Authority management system, method and storage medium of consumption machine

Publications (1)

Publication Number Publication Date
CN112214756A true CN112214756A (en) 2021-01-12

Family

ID=74049672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010985659.2A Pending CN112214756A (en) 2020-09-18 2020-09-18 Authority management system, method and storage medium of consumption machine

Country Status (1)

Country Link
CN (1) CN112214756A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113792310A (en) * 2021-09-01 2021-12-14 百融至信(北京)征信有限公司 Automatic data matching system and method
CN115240300A (en) * 2022-03-14 2022-10-25 云丁网络技术(北京)有限公司 Control method, system and device of intelligent security system and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500297A (en) * 2013-10-11 2014-01-08 济钢集团有限公司 Fine grit authority management method in information system
CN104881506A (en) * 2015-06-29 2015-09-02 山东钢铁股份有限公司 Configurable management information system right control method based on database
CN105373726A (en) * 2014-08-18 2016-03-02 南京普爱射线影像设备有限公司 User authority management system
CN110009314A (en) * 2019-04-18 2019-07-12 武汉鼠标科技有限公司 A kind of educational system and teaching platform of the behavioural analysis based on big data
CN110443010A (en) * 2019-07-22 2019-11-12 安徽智恒信科技股份有限公司 One kind permission visual configuration control method, device, terminal and storage medium in information system
CN111651738A (en) * 2020-04-28 2020-09-11 中国科学院计算机网络信息中心 Fine-grained role authority unified management method based on front-end and back-end separation framework and electronic device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500297A (en) * 2013-10-11 2014-01-08 济钢集团有限公司 Fine grit authority management method in information system
CN105373726A (en) * 2014-08-18 2016-03-02 南京普爱射线影像设备有限公司 User authority management system
CN104881506A (en) * 2015-06-29 2015-09-02 山东钢铁股份有限公司 Configurable management information system right control method based on database
CN110009314A (en) * 2019-04-18 2019-07-12 武汉鼠标科技有限公司 A kind of educational system and teaching platform of the behavioural analysis based on big data
CN110443010A (en) * 2019-07-22 2019-11-12 安徽智恒信科技股份有限公司 One kind permission visual configuration control method, device, terminal and storage medium in information system
CN111651738A (en) * 2020-04-28 2020-09-11 中国科学院计算机网络信息中心 Fine-grained role authority unified management method based on front-end and back-end separation framework and electronic device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蔡韶华: "一个智能消费管理系统及其安全性探讨", 现代计算机, pages 58 - 60 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113792310A (en) * 2021-09-01 2021-12-14 百融至信(北京)征信有限公司 Automatic data matching system and method
CN115240300A (en) * 2022-03-14 2022-10-25 云丁网络技术(北京)有限公司 Control method, system and device of intelligent security system and storage medium

Similar Documents

Publication Publication Date Title
CN107563203B (en) Integrated security policy and event management
EP3067817B1 (en) Dynamic data masking for mainframe application
US9544306B2 (en) Attempted security breach remediation
US9165156B2 (en) Role-based access control modeling and auditing system
CN104662547A (en) Mobile application management
JP5707250B2 (en) Database access management system, method, and program
CN100492300C (en) System and method for executing a process on a microprocessor-enabled device
JP2019519018A (en) Method and apparatus for reducing security risk in a networked computer system architecture
CN103258159A (en) Extensible and/or distributed authorization system and/or methods of providing the same
US9477194B2 (en) Image forming apparatus capable of limiting range of operation during maintenance, control method therefor, and storage medium
CN111814152A (en) Security assessment method, device, electronic equipment and medium
CN112214756A (en) Authority management system, method and storage medium of consumption machine
US9531725B2 (en) Optimizing infrastructure support based on authenticated access, validation and context related information retrieval
US10621380B2 (en) System and method for controlling reviews in an application store
US8495744B2 (en) Evaluation of risk of conflict for security solutions integration
CN114238273A (en) Database management method, device, equipment and storage medium
JP2006079251A (en) Command performance control system, control method, and its program
CN115935328A (en) Resource access control method, device, equipment and storage medium
CN112328996A (en) Operation authentication method, device, equipment and storage medium based on DCS system
Birnstill et al. Building blocks for identity management and protection for smart environments and interactive assistance systems
CN113794718A (en) Security authentication method and security authentication device for multiple application systems
JP6709057B2 (en) Remote control system and remote control program
JP5854070B2 (en) Access control device, terminal device, and program
JP2007172176A (en) Authentication device
Dogbe et al. A combined approach to prevent SQL Injection Attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination