CN112804252B - User management system - Google Patents

User management system Download PDF

Info

Publication number
CN112804252B
CN112804252B CN202110149221.5A CN202110149221A CN112804252B CN 112804252 B CN112804252 B CN 112804252B CN 202110149221 A CN202110149221 A CN 202110149221A CN 112804252 B CN112804252 B CN 112804252B
Authority
CN
China
Prior art keywords
information
module
single data
character string
data string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110149221.5A
Other languages
Chinese (zh)
Other versions
CN112804252A (en
Inventor
任晓娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Taole Technology Co ltd
Original Assignee
Beijing Taole Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Taole Technology Co ltd filed Critical Beijing Taole Technology Co ltd
Priority to CN202110149221.5A priority Critical patent/CN112804252B/en
Publication of CN112804252A publication Critical patent/CN112804252A/en
Application granted granted Critical
Publication of CN112804252B publication Critical patent/CN112804252B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention discloses a user management system, relates to the field of user management and authentication systems, and solves the problems that a participant and an organizer are inconvenient to communicate and are not beneficial to information sharing and information updating. The method comprises the steps that a task sub-module compiles abstract contents of editing information by adopting a hash algorithm to form a single data string and transmits the single data string to a database module, the database module records the single data string, the task sub-module also transmits the single data string to an authentication module, the authentication module encrypts the single data string by adopting an asymmetric encryption method to obtain a character string, each audit administrator audits user editing information, downloads the encrypted character string, decrypts the contents of the audit information, and processes corresponding information in the database module after audit. The invention integrates the division of encryption grades, realizes the equal and consistent information of each PC user connected to the Internet, and simultaneously avoids the interference of false information.

Description

User management system
Technical Field
The invention relates to a user management and authentication system, in particular to a user management system.
Background
With the rapid progress and development of the international society, organizations such as various types of sports dances, associations and various forms of public communication activities are increasingly frequent, and the large activities have hundreds of thousands of information intricacies every day, such as: shanghai world expo, large theme rides, and the like may also involve sports dancing related items.
However, various information publishing channels are different, website addresses are different, various publishing modes such as offline propaganda are involved, and the like are operated simultaneously, for a user, the information is searched and clustered and classified, the management method is complicated, and meanwhile, the true and false information is different, so that a participant and an organizer are inconvenient to communicate, the information sharing and the information updating are not facilitated, for the participant, consumption is easily induced by fake information and merchants on the internet, and for the organizer, the updated information is not convenient to be timely transmitted to the user.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the communication between the participator and the organizer is inconvenient, and the participator and the organizer are not beneficial to information sharing and information updating.
The invention is realized by the following technical scheme:
a user management system comprises an authentication module for user authentication, a database module and a task sub-module for user management;
the task sub-module outputs two data paths to the authentication module and the database module respectively;
the authentication module has the right to add, erase and modify data in the database module;
the user edits information at the pc end, including but not limited to editing member registration information and sending the information to the task sub-module;
the task sub-module compiles the abstract content of the editing information by adopting a hash algorithm to form a single data string and transmits the single data string to the database module, the database module records the single data string, the task sub-module also transmits the single data string to the authentication module, the authentication module encrypts the single data string by adopting an asymmetric encryption method to obtain a character string, each audit administrator audits the editing information of the user, downloads the encrypted character string and then decrypts the content of the audit information, and processes the corresponding information in the database module after audit, wherein the processing operation comprises one of adding, erasing and modifying;
the authorization of auditing the decryption of the user by an auditing manager is different, and comprises a primary authorization and a secondary authorization, namely the domains of the edited information are different, the auditing manager with the primary authorization audits the user to decrypt all the edited information, and simultaneously accesses the authenticated character string to the character string existing on the network, and the auditing manager with the primary authorization maintains the longest character string;
a secondary authority auditing manager connected to the Internet updates the character string in the PC terminal to obtain a character string consistent with the longest character string on the Internet, and then single data string auditing is carried out again according to the auditing authority level of the manager;
the task sub-module outputs a task chain of the plurality of users.
Further, the information category of the primary authority audit includes member registration information, and the editing information issued to the internet character string after the authentication of the primary authority audit administrator does not include the member registration information.
Further, the information category audited by the auditing administrator of the secondary authority is member registration information.
Further, the task sub-module identifies the abstract content of the editing information and classifies the editing information, and the classification and distinction standard is the content of the editing information which is audited according to the authority of the audit administrator;
and the task sub-module classifies the editing information into the editing information audited by the primary authority audit administrator and the editing information audited by the secondary authority audit administrator.
And further, the task submodule parallelly issues the character strings to a serial port bus, and then issues the character strings to a server where the database module is located through the wireless module.
Further, the first-level public key adopted by the first-level authority auditing manager decrypts the single data string to obtain the editing information audited by the first-level authority auditing manager of the task sub-module classification, and the second-level public key adopted by the second-level authority auditing manager decrypts the single data string to obtain the editing information audited by the second-level authority auditing manager of the task sub-module classification;
the two formats are not compatible with each other, wherein the second-level public key is compatible with the first-level public key, and the second-level public key is not compatible with the first-level public key.
The method comprises the steps that a first-level authority auditing manager audits other editing information of non-member registration information and then issues the information to a long string of a character string, all auditing managers of the whole network maintain the longest encryption character string together, the first-level authority auditing manager only edits and audits the non-member registration information and then sends the information to a database module for processing, for a second-level authority auditing manager PC which is offline and shut down, request information is sent to surrounding network blocks at the time of network connection, the address of the longest encryption character string is downloaded and updated, and after the update, the second-level authority auditing manager modifies, adds or erases a record of a corresponding single data string of the database module according to the corresponding member registration information.
The invention has the following advantages and beneficial effects:
the invention integrates the division of encryption grades, realizes the equal and consistent information of each PC user connected to the Internet, and simultaneously avoids the interference of false information.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a block diagram of the present invention.
Detailed Description
Hereinafter, the term "including" or "may include" used in various embodiments of the present invention indicates the presence of the inventive function, operation, or element, and does not limit the addition of one or more functions, operations, or elements. Furthermore, as used in various embodiments of the present invention, the terms "comprises," "comprising," "includes," "including," "has," "having" and their derivatives are intended to mean that the specified features, numbers, steps, operations, elements, components, or combinations of the foregoing, are only meant to indicate that a particular feature, number, step, operation, element, component, or combination of the foregoing, and should not be construed as first excluding the existence of, or adding to the possibility of, one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
In various embodiments of the invention, the expression "or" at least one of a or/and B "includes any or all combinations of the words listed simultaneously. For example, the expression "a or B" or "at least one of a or/and B" may include a, may include B, or may include both a and B.
Expressions (such as "first", "second", and the like) used in various embodiments of the present invention may modify various constituent elements in various embodiments, but may not limit the respective constituent elements. For example, the above description does not limit the order and/or importance of the elements described. The foregoing description is for the purpose of distinguishing one element from another. For example, the first user device and the second user device indicate different user devices, although both are user devices. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of various embodiments of the present invention.
It should be noted that: if it is described that one constituent element is "connected" to another constituent element, the first constituent element may be directly connected to the second constituent element, and a third constituent element may be "connected" between the first constituent element and the second constituent element. In contrast, when one constituent element is "directly connected" to another constituent element, it is understood that there is no third constituent element between the first constituent element and the second constituent element.
The terminology used in the various embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the various embodiments of the invention. As used herein, the singular forms are intended to include the plural forms as well, unless the context clearly indicates otherwise. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in various embodiments of the present invention.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
A user management system comprises an authentication module for user authentication, a database module and a task sub-module for user management;
the task sub-module outputs two data paths to the authentication module and the database module respectively;
the authentication module has the right to add, erase and modify data in the database module;
the user edits information at the pc end, including but not limited to editing member registration information and sending the information to the task sub-module;
the task sub-module compiles the abstract content of the editing information by adopting a hash algorithm to form a single data string and transmits the single data string to the database module, the database module records the single data string, the task sub-module also transmits the single data string to the authentication module, the authentication module encrypts the single data string by adopting an asymmetric encryption method to obtain a character string, each audit administrator audits the editing information of the user, downloads the encrypted character string and then decrypts the content of the audit information, and processes the corresponding information in the database module after audit, wherein the processing operation comprises one of adding, erasing and modifying;
the authorization for auditing the decryption of the user by an auditing manager is different, and comprises a primary authorization and a secondary authorization, namely the audited editing information has different categories, the auditing manager of the primary authorization audits the user to decrypt all the editing information, and simultaneously accesses the authenticated character string to the character string existing on the network, and the auditing manager of the primary authorization maintains the longest character string;
a secondary authority auditing manager connected to the Internet updates the character string in the PC terminal to obtain a character string consistent with the longest character string on the Internet, and a single data string is audited again according to the auditing authority level of the administrator;
the task submodule outputs a task chain of a plurality of users.
Further, the information category of the primary authority audit includes member registration information, and the editing information issued to the internet character string after the authentication of the primary authority audit administrator does not include the member registration information.
Further, the information category audited by the auditing administrator of the secondary authority is member registration information.
Further, the task sub-module identifies the abstract content of the editing information and classifies the editing information, and the classification and distinguishing standard is according to the editing information content audited by the authority of the audit administrator;
and the task sub-module classifies the editing information into the editing information audited by the primary authority audit administrator and the editing information audited by the secondary authority audit administrator.
And further, the task sub-module issues the character strings to a serial port bus in parallel, and then the character strings are issued to a server where the database module is located by the wireless module.
Further, the first-level public key adopted by the first-level authority auditing manager decrypts the single data string to obtain the editing information audited by the first-level authority auditing manager of the task sub-module classification, and the second-level public key adopted by the second-level authority auditing manager decrypts the single data string to obtain the editing information audited by the second-level authority auditing manager of the task sub-module classification;
the two formats are not compatible with each other, wherein the second-level public key is compatible with the first-level public key, and the second-level public key is not compatible with the first-level public key.
The method comprises the steps that a first-level authority auditing manager audits other editing information of non-member registration information and then issues the information to a long string of a character string, all auditing managers of the whole network maintain the longest encryption character string together, the first-level authority auditing manager only edits and audits the non-member registration information and then sends the information to a database module for processing, and for a second-level authority auditing manager PC which is offline and shut down, request information is sent to surrounding network blocks at the time of connecting to the network to obtain an address for downloading and updating the longest encryption character string, and after updating, the second-level authority auditing manager modifies, adds or erases a record of a corresponding single data string of the database module according to the corresponding member registration information.
Preferably, the task submodules are shared by multiple users, including user 1, user 2, user 3, \8230; \ user N.
Preferred hashing algorithms employed are the SHA series of algorithms including, but not limited to, SHA-0 and SHA-1;
the above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (4)

1. A user management system is characterized by comprising an authentication module for user authentication, a database module and a task submodule for user management;
the task sub-module outputs two data paths to the authentication module and the database module respectively;
the authentication module has the right to add, erase and modify data in the database module;
the user edits information at the pc end, including but not limited to editing member registration information and sending the information to the task sub-module;
the task sub-module adopts a hash algorithm to compile the abstract content of the editing information to form a single data string and transmits the single data string to the database module, the database module records the single data string, the task sub-module also transmits the single data string to the authentication module, the authentication module adopts an asymmetric encryption method to encrypt the single data string to obtain a character string, each audit manager audits the editing information of a user, downloads the encrypted character string to decrypt and then audits the content of the information, and processes the corresponding information in the database module after auditing, wherein the processing operation comprises one of adding, erasing and modifying;
the authorization of the authorization administrator to verify the decryption of the user is different and comprises a primary authorization and a secondary authorization, wherein the information scope of the primary authorization verification comprises member registration information, the editing information issued to the Internet character string after the authentication of the primary authorization verification administrator does not comprise the member registration information, the information scope of the authorization administrator of the secondary authorization verification is the member registration information, namely the domains of the verified editing information are different, the authorization administrator of the primary authorization verifies the decryption of all the editing information of the user and simultaneously accesses the authenticated character string to the character string existing on the network, and the authorization administrator of the primary authorization maintains the longest character string;
a secondary authority auditing manager connected to the Internet updates the character string in the PC terminal to obtain a character string consistent with the longest character string on the Internet, and then single data string auditing is carried out again according to the auditing authority level of the manager;
the task submodule outputs a task chain of a plurality of users.
2. The user management system according to claim 1, wherein the task sub-module identifies summary content of the editing information and classifies the editing information, the classification criteria being based on the editing information content audited by the authority of the audit administrator;
and the task sub-module classifies the editing information into the editing information audited by the primary authority audit administrator and the editing information audited by the secondary authority audit administrator.
3. The user management system according to claim 1, wherein the task submodule issues the character strings to the serial port bus in parallel, and then issues the character strings to the server where the database module is located through the wireless module.
4. The user management system according to claim 2, wherein the first-level public key adopted by the first-level authority audit administrator decrypts the single data string to obtain the edit information audited by the first-level authority audit administrator of the task sub-module classification, and the second-level public key adopted by the second-level authority audit administrator decrypts the single data string to obtain the edit information audited by the second-level authority audit administrator of the task sub-module classification;
the two formats are not compatible with each other, wherein the second-level public key is compatible with the first-level public key, and the second-level public key is not compatible with the first-level public key.
CN202110149221.5A 2021-02-03 2021-02-03 User management system Active CN112804252B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110149221.5A CN112804252B (en) 2021-02-03 2021-02-03 User management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110149221.5A CN112804252B (en) 2021-02-03 2021-02-03 User management system

Publications (2)

Publication Number Publication Date
CN112804252A CN112804252A (en) 2021-05-14
CN112804252B true CN112804252B (en) 2023-04-11

Family

ID=75813891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110149221.5A Active CN112804252B (en) 2021-02-03 2021-02-03 User management system

Country Status (1)

Country Link
CN (1) CN112804252B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114417392B (en) * 2022-04-02 2022-06-10 湖南宸瀚科技有限公司 Multi-auditing system for block chain editing permission

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145233A (en) * 2006-09-12 2008-03-19 中国农业银行 Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method
CN101561815A (en) * 2009-05-19 2009-10-21 华中科技大学 Distributed cryptograph full-text retrieval system
CN102624728A (en) * 2012-03-09 2012-08-01 浙江大学城市学院 Method and system for carrying out whole-network login authentication by utilizing registered website user information
CN102833256A (en) * 2012-09-03 2012-12-19 广州杰赛科技股份有限公司 Method and cloud system for registering cluster control server and node control server
CN109522731A (en) * 2018-11-07 2019-03-26 温州杉果数据科技有限公司 A kind of big data information security storage encryption system and its method
CN109922039A (en) * 2019-01-14 2019-06-21 湘潭大学 A kind of identity management method of half centralization based on block chain technology
CN110417781A (en) * 2019-07-30 2019-11-05 中国工商银行股份有限公司 File encryption management method, client and server based on block chain
CN110708167A (en) * 2019-10-14 2020-01-17 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
CN111080269A (en) * 2019-12-31 2020-04-28 徐州八方网络科技有限公司 Digital network background information content management system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101371608B1 (en) * 2011-10-10 2014-03-14 주식회사 알티베이스 Database Management System and Encrypting Method thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145233A (en) * 2006-09-12 2008-03-19 中国农业银行 Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method
CN101561815A (en) * 2009-05-19 2009-10-21 华中科技大学 Distributed cryptograph full-text retrieval system
CN102624728A (en) * 2012-03-09 2012-08-01 浙江大学城市学院 Method and system for carrying out whole-network login authentication by utilizing registered website user information
CN102833256A (en) * 2012-09-03 2012-12-19 广州杰赛科技股份有限公司 Method and cloud system for registering cluster control server and node control server
CN109522731A (en) * 2018-11-07 2019-03-26 温州杉果数据科技有限公司 A kind of big data information security storage encryption system and its method
CN109922039A (en) * 2019-01-14 2019-06-21 湘潭大学 A kind of identity management method of half centralization based on block chain technology
CN110417781A (en) * 2019-07-30 2019-11-05 中国工商银行股份有限公司 File encryption management method, client and server based on block chain
CN110708167A (en) * 2019-10-14 2020-01-17 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
CN111080269A (en) * 2019-12-31 2020-04-28 徐州八方网络科技有限公司 Digital network background information content management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Modifiable Public Blockchains Using Truncated Hashing and Sidechains";Nam-Yong Lee、Jinhong Yang、Md Mehedi Hassan Onik、Chul-Soo Kim;《IEEE Access》;20191128;第7卷;全文 *
"基于SQL Server数据库账户安全的战略研究";刘冬华、张捷、张莉;《煤炭技术》;20110910;第30卷(第09期);第178-180页 *

Also Published As

Publication number Publication date
CN112804252A (en) 2021-05-14

Similar Documents

Publication Publication Date Title
CN108389130B (en) Method for generating multi-transaction mode alliance chain
US7171557B2 (en) System for optimized key management with file groups
EP1460511B1 (en) Reviewing cached user-group information in connection with issuing a digital rights management (DRM) license for content
AU2004200471B2 (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
US7502945B2 (en) Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system
CA2456400C (en) Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (drm) system
CN105706048B (en) It is authenticated using the media client end device of hardware root of trust
CN100576148C (en) Be used to provide the system and method for security server cipher key operation
CN111800268A (en) Zero knowledge proof for block chain endorsements
JP4486380B2 (en) Issuing digital rights management (DRM) licenses for content based on cross-forest directory information
US7447917B2 (en) Obfuscated state store for rights management system and the like
US20090063846A1 (en) Systems and methods for prevention of peer-to-peer file sharing
JP2004054937A (en) Method for obtaining signed right label (srl) for digital content in digital right management system by using right template
KR20040076811A (en) Issuing a publisher use license off-line in a digital rights management(drm) system
KR20050119133A (en) User identity privacy in authorization certificates
CN112804252B (en) User management system
CN116583833A (en) Self-auditing blockchain
US20040139211A1 (en) Systems and methods for prevention of peer-to-peer file sharing
CN113569298A (en) Identity generation method and identity system based on block chain
US8755521B2 (en) Security method and system for media playback devices
KR102286016B1 (en) System Providing Cloud Service Based on Blockchain
CN114676449B (en) Internet of things data searchable encryption method based on verifiable database
Ramachandran et al. Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
CN116527404B (en) Digital collection directional sharing method and system based on block chain
CN107122678A (en) Protect the method and device of product parameters

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230328

Address after: Room M1912, 19th Floor, China Ruida Building, No. 74 Lugu Road, Shijingshan District, Beijing, 100043

Applicant after: Beijing Taole Technology Co.,Ltd.

Address before: 610000 group 2, Baita village, Tianhui Township, Jinniu District, Chengdu City, Sichuan Province

Applicant before: Ren Xiaojiao

GR01 Patent grant
GR01 Patent grant