CN112804252A - User management system - Google Patents

User management system Download PDF

Info

Publication number
CN112804252A
CN112804252A CN202110149221.5A CN202110149221A CN112804252A CN 112804252 A CN112804252 A CN 112804252A CN 202110149221 A CN202110149221 A CN 202110149221A CN 112804252 A CN112804252 A CN 112804252A
Authority
CN
China
Prior art keywords
information
module
single data
authority
data string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110149221.5A
Other languages
Chinese (zh)
Other versions
CN112804252B (en
Inventor
任晓娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Taole Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110149221.5A priority Critical patent/CN112804252B/en
Publication of CN112804252A publication Critical patent/CN112804252A/en
Application granted granted Critical
Publication of CN112804252B publication Critical patent/CN112804252B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention discloses a user management system, relates to the field of user management and authentication systems, and solves the problems that a participant and an organizer are inconvenient to communicate and are not beneficial to information sharing and information updating. The method comprises the steps that a task sub-module compiles abstract contents of editing information by adopting a hash algorithm to form a single data string and transmits the single data string to a database module, the database module records the single data string, the task sub-module also transmits the single data string to an authentication module, the authentication module encrypts the single data string by adopting an asymmetric encryption method to obtain a character string, each audit administrator audits user editing information, downloads the encrypted character string, decrypts the contents of the audit information, and processes corresponding information in the database module after audit. The invention integrates the division of encryption grades, realizes the equal and consistent information of each PC user connected to the Internet, and simultaneously avoids the interference of false information.

Description

User management system
Technical Field
The invention relates to a user management and authentication system, in particular to a user management system.
Background
With the rapid progress and development of the international society, organizations such as various types of sports dances, associations and various forms of public communication activities are increasingly frequent, and the large activities have hundreds of thousands of information intricacies every day, such as: shanghai world expo, large theme amusement parks, etc. may also involve sports dancing related projects.
However, various information publishing channels are different, website addresses are different, various publishing modes such as offline propaganda are involved, and the like are operated simultaneously, for a user, the information is searched and clustered and classified, the management method is complicated, and meanwhile, the true and false information is different, so that a participant and an organizer are inconvenient to communicate, the information sharing and the information updating are not facilitated, for the participant, consumption is easily induced by fake information and merchants on the internet, and for the organizer, the updated information is not convenient to be timely transmitted to the user.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the communication between the participator and the organizer is inconvenient and is not beneficial to information sharing and information updating, and the invention provides a user management system for solving the problems.
The invention is realized by the following technical scheme:
a user management system comprises an authentication module for user authentication, a database module and a task sub-module for user management;
the task sub-module outputs two data paths to the authentication module and the database module respectively;
the authentication module has the right to add, erase and modify data in the database module;
the user edits information at the pc end, including but not limited to editing member registration information and sending the information to the task sub-module;
the task sub-module compiles the abstract content of the editing information by adopting a hash algorithm to form a single data string and transmits the single data string to the database module, the database module records the single data string, the task sub-module also transmits the single data string to the authentication module, the authentication module encrypts the single data string by adopting an asymmetric encryption method to obtain a character string, each audit administrator audits the editing information of the user, downloads the encrypted character string and then decrypts the content of the audit information, and processes the corresponding information in the database module after audit, wherein the processing operation comprises one of adding, erasing and modifying;
the authorization of auditing the decryption of the user by an auditing manager is different, and comprises a primary authorization and a secondary authorization, namely the domains of the edited information are different, the auditing manager with the primary authorization audits the user to decrypt all the edited information, and simultaneously accesses the authenticated character string to the character string existing on the network, and the auditing manager with the primary authorization maintains the longest character string;
a secondary authority auditing manager connected to the Internet updates the character string in the PC terminal to obtain a character string consistent with the longest character string on the Internet, and a single data string is audited again according to the auditing authority level of the administrator;
the task submodule outputs a task chain of a plurality of users.
Further, the information category of the primary authority audit includes member registration information, and the editing information issued to the internet character string after the authentication of the primary authority audit administrator does not include the member registration information.
Further, the information category audited by the auditing administrator of the secondary authority is member registration information.
Further, the task sub-module identifies the abstract content of the editing information and classifies the editing information, and the classification and distinction standard is the content of the editing information which is audited according to the authority of the audit administrator;
and the task sub-module classifies the editing information into the editing information audited by the primary authority audit administrator and the editing information audited by the secondary authority audit administrator.
And further, the task submodule parallelly issues the character strings to a serial port bus, and then issues the character strings to a server where the database module is located through the wireless module.
Further, the first-level public key adopted by the first-level authority auditing manager decrypts the single data string to obtain the editing information audited by the first-level authority auditing manager of the task sub-module classification, and the second-level public key adopted by the second-level authority auditing manager decrypts the single data string to obtain the editing information audited by the second-level authority auditing manager of the task sub-module classification;
the two formats are not compatible with each other, wherein the second-level public key is compatible with the first-level public key, and the second-level public key is not compatible with the first-level public key.
The method comprises the steps that a first-level authority auditing manager audits other editing information of non-member registration information and then issues the information to a long string of a character string, all auditing managers of the whole network maintain the longest encryption character string together, the first-level authority auditing manager only edits and audits the non-member registration information and then sends the information to a database module for processing, for a second-level authority auditing manager PC which is offline and shut down, request information is sent to surrounding network blocks at the time of network connection, the address of the longest encryption character string is downloaded and updated, and after the update, the second-level authority auditing manager modifies, adds or erases a record of a corresponding single data string of the database module according to the corresponding member registration information.
The invention has the following advantages and beneficial effects:
the invention integrates the division of encryption grades, realizes the equal and consistent information of each PC user connected to the Internet, and simultaneously avoids the interference of false information.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a block diagram of the present invention.
Detailed Description
Hereinafter, the term "comprising" or "may include" used in various embodiments of the present invention indicates the presence of the invented function, operation or element, and does not limit the addition of one or more functions, operations or elements. Furthermore, as used in various embodiments of the present invention, the terms "comprises," "comprising," "includes," "including," "has," "having" and their derivatives are intended to mean that the specified features, numbers, steps, operations, elements, components, or combinations of the foregoing, are only meant to indicate that a particular feature, number, step, operation, element, component, or combination of the foregoing, and should not be construed as first excluding the existence of, or adding to the possibility of, one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
In various embodiments of the invention, the expression "or" at least one of a or/and B "includes any or all combinations of the words listed simultaneously. For example, the expression "a or B" or "at least one of a or/and B" may include a, may include B, or may include both a and B.
Expressions (such as "first", "second", and the like) used in various embodiments of the present invention may modify various constituent elements in various embodiments, but may not limit the respective constituent elements. For example, the above description does not limit the order and/or importance of the elements described. The foregoing description is for the purpose of distinguishing one element from another. For example, the first user device and the second user device indicate different user devices, although both are user devices. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of various embodiments of the present invention.
It should be noted that: if it is described that one constituent element is "connected" to another constituent element, the first constituent element may be directly connected to the second constituent element, and a third constituent element may be "connected" between the first constituent element and the second constituent element. In contrast, when one constituent element is "directly connected" to another constituent element, it is understood that there is no third constituent element between the first constituent element and the second constituent element.
The terminology used in the various embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the various embodiments of the invention. As used herein, the singular forms are intended to include the plural forms as well, unless the context clearly indicates otherwise. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in various embodiments of the present invention.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
A user management system comprises an authentication module for user authentication, a database module and a task sub-module for user management;
the task sub-module outputs two data paths to the authentication module and the database module respectively;
the authentication module has the right to add, erase and modify data in the database module;
the user edits information at the pc end, including but not limited to editing member registration information and sending the information to the task sub-module;
the task sub-module compiles the abstract content of the editing information by adopting a hash algorithm to form a single data string and transmits the single data string to the database module, the database module records the single data string, the task sub-module also transmits the single data string to the authentication module, the authentication module encrypts the single data string by adopting an asymmetric encryption method to obtain a character string, each audit administrator audits the editing information of the user, downloads the encrypted character string and then decrypts the content of the audit information, and processes the corresponding information in the database module after audit, wherein the processing operation comprises one of adding, erasing and modifying;
the authorization of auditing the decryption of the user by an auditing manager is different, and comprises a primary authorization and a secondary authorization, namely the domains of the edited information are different, the auditing manager with the primary authorization audits the user to decrypt all the edited information, and simultaneously accesses the authenticated character string to the character string existing on the network, and the auditing manager with the primary authorization maintains the longest character string;
a secondary authority auditing manager connected to the Internet updates the character string in the PC terminal to obtain a character string consistent with the longest character string on the Internet, and a single data string is audited again according to the auditing authority level of the administrator;
the task submodule outputs a task chain of a plurality of users.
Further, the information category of the primary authority audit includes member registration information, and the editing information issued to the internet character string after the authentication of the primary authority audit administrator does not include the member registration information.
Further, the information category audited by the auditing administrator of the secondary authority is member registration information.
Further, the task sub-module identifies the abstract content of the editing information and classifies the editing information, and the classification and distinction standard is the content of the editing information which is audited according to the authority of the audit administrator;
and the task sub-module classifies the editing information into the editing information audited by the primary authority audit administrator and the editing information audited by the secondary authority audit administrator.
And further, the task submodule parallelly issues the character strings to a serial port bus, and then issues the character strings to a server where the database module is located through the wireless module.
Further, the first-level public key adopted by the first-level authority auditing manager decrypts the single data string to obtain the editing information audited by the first-level authority auditing manager of the task sub-module classification, and the second-level public key adopted by the second-level authority auditing manager decrypts the single data string to obtain the editing information audited by the second-level authority auditing manager of the task sub-module classification;
the two formats are not compatible with each other, wherein the second-level public key is compatible with the first-level public key, and the second-level public key is not compatible with the first-level public key.
The method comprises the steps that a first-level authority auditing manager audits other editing information of non-member registration information and then issues the information to a long string of a character string, all auditing managers of the whole network maintain the longest encryption character string together, the first-level authority auditing manager only edits and audits the non-member registration information and then sends the information to a database module for processing, for a second-level authority auditing manager PC which is offline and shut down, request information is sent to surrounding network blocks at the time of network connection, the address of the longest encryption character string is downloaded and updated, and after the update, the second-level authority auditing manager modifies, adds or erases a record of a corresponding single data string of the database module according to the corresponding member registration information.
Preferably, the task submodule shared by multiple users comprises a user 1, a user 2, a user 3, … … and a user N.
Preferred hashing algorithms employed are the SHA series of algorithms including, but not limited to, SHA-0 and SHA-1;
the above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (6)

1. A user management system is characterized by comprising an authentication module for user authentication, a database module and a task submodule for user management;
the task sub-module outputs two data paths to the authentication module and the database module respectively;
the authentication module has the right to add, erase and modify data in the database module;
the user edits information at the pc end, including but not limited to editing member registration information and sending the information to the task sub-module;
the task sub-module compiles the abstract content of the editing information by adopting a hash algorithm to form a single data string and transmits the single data string to the database module, the database module records the single data string, the task sub-module also transmits the single data string to the authentication module, the authentication module encrypts the single data string by adopting an asymmetric encryption method to obtain a character string, each audit administrator audits the editing information of the user, downloads the encrypted character string and then decrypts the content of the audit information, and processes the corresponding information in the database module after audit, wherein the processing operation comprises one of adding, erasing and modifying;
the authorization of auditing the decryption of the user by an auditing manager is different, and comprises a primary authorization and a secondary authorization, namely the domains of the edited information are different, the auditing manager with the primary authorization audits the user to decrypt all the edited information, and simultaneously accesses the authenticated character string to the character string existing on the network, and the auditing manager with the primary authorization maintains the longest character string;
a secondary authority auditing manager connected to the Internet updates the character string in the PC terminal to obtain a character string consistent with the longest character string on the Internet, and a single data string is audited again according to the auditing authority level of the administrator;
the task submodule outputs a task chain of a plurality of users.
2. The system as claimed in claim 1, wherein the information category of the primary authority audit includes member registration information, and the edit information issued to the internet string after the authentication of the primary authority audit administrator does not include member registration information.
3. A user management system according to claim 1, wherein the information category checked by the checking administrator of the secondary authority is member registration information.
4. The user management system according to claim 1, wherein the task sub-module identifies summary content of the editing information and classifies the editing information, the classification criteria being based on the editing information content audited by the authority of the audit administrator;
and the task sub-module classifies the editing information into the editing information audited by the primary authority audit administrator and the editing information audited by the secondary authority audit administrator.
5. The user management system according to claim 1, wherein the task submodule issues the character strings to the serial port bus in parallel, and then issues the character strings to the server where the database module is located through the wireless module.
6. The user management system according to claim 4, wherein the first-level public key adopted by the first-level authority audit administrator decrypts the single data string to obtain the edit information audited by the first-level authority audit administrator of the task sub-module classification, and the second-level public key adopted by the second-level authority audit administrator decrypts the single data string to obtain the edit information audited by the second-level authority audit administrator of the task sub-module classification;
the two formats are not compatible with each other, wherein the second-level public key is compatible with the first-level public key, and the second-level public key is not compatible with the first-level public key.
CN202110149221.5A 2021-02-03 2021-02-03 User management system Active CN112804252B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110149221.5A CN112804252B (en) 2021-02-03 2021-02-03 User management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110149221.5A CN112804252B (en) 2021-02-03 2021-02-03 User management system

Publications (2)

Publication Number Publication Date
CN112804252A true CN112804252A (en) 2021-05-14
CN112804252B CN112804252B (en) 2023-04-11

Family

ID=75813891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110149221.5A Active CN112804252B (en) 2021-02-03 2021-02-03 User management system

Country Status (1)

Country Link
CN (1) CN112804252B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114417392A (en) * 2022-04-02 2022-04-29 湖南宸瀚信息科技有限责任公司 Multiple auditing system for block chain editing permission

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145233A (en) * 2006-09-12 2008-03-19 中国农业银行 Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method
CN101561815A (en) * 2009-05-19 2009-10-21 华中科技大学 Distributed cryptograph full-text retrieval system
CN102624728A (en) * 2012-03-09 2012-08-01 浙江大学城市学院 Method and system for carrying out whole-network login authentication by utilizing registered website user information
CN102833256A (en) * 2012-09-03 2012-12-19 广州杰赛科技股份有限公司 Method and cloud system for registering cluster control server and node control server
US20130091357A1 (en) * 2011-10-10 2013-04-11 Altibase Corp. Database management system and encryption method performed in database
CN109522731A (en) * 2018-11-07 2019-03-26 温州杉果数据科技有限公司 A kind of big data information security storage encryption system and its method
CN109922039A (en) * 2019-01-14 2019-06-21 湘潭大学 A kind of identity management method of half centralization based on block chain technology
CN110417781A (en) * 2019-07-30 2019-11-05 中国工商银行股份有限公司 File encryption management method, client and server based on block chain
CN110708167A (en) * 2019-10-14 2020-01-17 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
CN111080269A (en) * 2019-12-31 2020-04-28 徐州八方网络科技有限公司 Digital network background information content management system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145233A (en) * 2006-09-12 2008-03-19 中国农业银行 Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method
CN101561815A (en) * 2009-05-19 2009-10-21 华中科技大学 Distributed cryptograph full-text retrieval system
US20130091357A1 (en) * 2011-10-10 2013-04-11 Altibase Corp. Database management system and encryption method performed in database
CN102624728A (en) * 2012-03-09 2012-08-01 浙江大学城市学院 Method and system for carrying out whole-network login authentication by utilizing registered website user information
CN102833256A (en) * 2012-09-03 2012-12-19 广州杰赛科技股份有限公司 Method and cloud system for registering cluster control server and node control server
CN109522731A (en) * 2018-11-07 2019-03-26 温州杉果数据科技有限公司 A kind of big data information security storage encryption system and its method
CN109922039A (en) * 2019-01-14 2019-06-21 湘潭大学 A kind of identity management method of half centralization based on block chain technology
CN110417781A (en) * 2019-07-30 2019-11-05 中国工商银行股份有限公司 File encryption management method, client and server based on block chain
CN110708167A (en) * 2019-10-14 2020-01-17 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
CN111080269A (en) * 2019-12-31 2020-04-28 徐州八方网络科技有限公司 Digital network background information content management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NAM-YONG LEE、JINHONG YANG、MD MEHEDI HASSAN ONIK、CHUL-SOO KIM: ""Modifiable Public Blockchains Using Truncated Hashing and Sidechains"", 《IEEE ACCESS》 *
刘冬华、张捷、张莉: ""基于SQL Server数据库账户安全的战略研究"", 《煤炭技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114417392A (en) * 2022-04-02 2022-04-29 湖南宸瀚信息科技有限责任公司 Multiple auditing system for block chain editing permission
CN114417392B (en) * 2022-04-02 2022-06-10 湖南宸瀚科技有限公司 Multi-auditing system for block chain editing permission

Also Published As

Publication number Publication date
CN112804252B (en) 2023-04-11

Similar Documents

Publication Publication Date Title
CN108389130B (en) Method for generating multi-transaction mode alliance chain
CN111800268B (en) Zero knowledge proof for blockchain endorsements
Yu et al. Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
US7171557B2 (en) System for optimized key management with file groups
KR100984440B1 (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management(drm) system
CN105706048B (en) It is authenticated using the media client end device of hardware root of trust
JP4486380B2 (en) Issuing digital rights management (DRM) licenses for content based on cross-forest directory information
CN100576148C (en) Be used to provide the system and method for security server cipher key operation
EP1460511B1 (en) Reviewing cached user-group information in connection with issuing a digital rights management (DRM) license for content
CN100566242C (en) In defined field such as tissue, announce digital content according to digital rights management (DRM) system
CN112765245A (en) Electronic government affair big data processing platform
CN111144881A (en) Selective access to asset transfer data
CN112069165A (en) Document redaction and coordination
CN106874461A (en) A kind of workflow engine supports multi-data source configuration security access system and method
KR20050089746A (en) Using a flexible rights template to obtain a signed rights label(srl) for digital content in a rights management system
JP2004054937A (en) Method for obtaining signed right label (srl) for digital content in digital right management system by using right template
CN114128214A (en) Security layer for configuring block chains
CN109918926B (en) Data classification authentication method based on block chain, node and block chain system
JP2008186330A (en) Use authorization managing device, content sharing system, content sharing method and content sharing program
CN115943411A (en) Noisy transactions for protecting data
CN112804252B (en) User management system
CN115705571A (en) Protecting privacy of auditable accounts
KR102286016B1 (en) System Providing Cloud Service Based on Blockchain
CN116583833A (en) Self-auditing blockchain
CN113569298A (en) Identity generation method and identity system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230328

Address after: Room M1912, 19th Floor, China Ruida Building, No. 74 Lugu Road, Shijingshan District, Beijing, 100043

Applicant after: Beijing Taole Technology Co.,Ltd.

Address before: 610000 group 2, Baita village, Tianhui Township, Jinniu District, Chengdu City, Sichuan Province

Applicant before: Ren Xiaojiao

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant