CN114417278A - Interface unified management system and platform interface management system - Google Patents

Interface unified management system and platform interface management system Download PDF

Info

Publication number
CN114417278A
CN114417278A CN202111674078.8A CN202111674078A CN114417278A CN 114417278 A CN114417278 A CN 114417278A CN 202111674078 A CN202111674078 A CN 202111674078A CN 114417278 A CN114417278 A CN 114417278A
Authority
CN
China
Prior art keywords
interface
application
management system
data
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111674078.8A
Other languages
Chinese (zh)
Inventor
皮强
李谟毫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianwen Digital Media Technology Beijing Co ltd
Original Assignee
Tianwen Digital Media Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianwen Digital Media Technology Beijing Co ltd filed Critical Tianwen Digital Media Technology Beijing Co ltd
Priority to CN202111674078.8A priority Critical patent/CN114417278A/en
Publication of CN114417278A publication Critical patent/CN114417278A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/382Information transfer, e.g. on bus using universal interface adapter
    • G06F13/385Information transfer, e.g. on bus using universal interface adapter for adaptation of a particular data processing system to different peripheral devices

Abstract

The invention discloses an interface unified management system and a platform interface management system, which comprise a gateway management layer and an interface service layer, wherein the gateway management layer is used for judging the interface state and determining the interface application conditions, including judging the interface online state, confirming the interface type and verifying the interface calling authority; the interface service layer is used for generating an interface list according to interface setting and registration application, checking the interface application authority, controlling the interface to be matched with the interface application role, performing security level control and keyword control, and returning an interface calling result. The platform interface management system comprises a data open portal system, a data theme management system and an interface unified management system, and the interface unified management system is used for carrying out unified management on platform interfaces and improving the interface management efficiency.

Description

Interface unified management system and platform interface management system
Technical Field
The invention relates to the technical field of interface management, in particular to an interface unified management system and a platform interface management system.
Background
At present, management of interfaces and authorities is generally set based on each system, a server sets authorities for each client, authority verification is generated according to requests of the clients and is sent to a database, the database calls an authority function table to compare and feeds back to a server comparison result, the server judges authorities and gives corresponding authority range operations to the clients according to the judgment result.
Under the condition, if the client organization architecture changes or the business management target is adjusted, the authority system design cannot respond in time or meet the change of the data authority, and the development and sharing of the data cannot continuously guarantee the requirement of a manager on the safety. The platform authority architecture is difficult to evolve, and the service level reconstruction cost is huge. The main manifestations are as follows:
1) the authority identification control logic for acquiring data by a user is in a service layer, the authority control and service data processing cannot be well decoupled, and the frequent updating of service layer codes is directly caused along with the change of services or authorities;
2) the same data set exists, and because the permission open range and the data range are different, a plurality of different interfaces are required to be provided for permission control;
3) the data structure (attribute) returned by the open interface is relatively fixed, and cannot meet the requirements of dynamic management and dynamic authority adjustment on a returned result set;
4) the authority configuration mode is relatively fixed and not flexible enough, and meanwhile, the management level standards of the industry, such as organization level control of provinces, cities, districts and schools in the education industry, and more specific organization control granularity of school paragraphs, grades and classes, cannot be met.
Therefore, unified management of interfaces is a problem to be solved.
Disclosure of Invention
The invention aims to provide an interface unified management system and a platform interface management system, which utilize the unified control capability of a gateway layer, combine interface data management, use a small amount of data authority codes for intrusion, realize the unified management of interfaces, apply the interface unified management system to the platform interface management, perform the unified management on the platform interfaces and improve the interface management efficiency.
In a first aspect, the above object of the present invention is achieved by the following technical solutions:
a kind of interface unifies the management system, including gateway management layer and interface business layer, the gateway management layer is used for judging the interface state, confirming the interface application condition, including judging the online state of the interface, confirming the interface type, prove the interface calls the authority; the interface service layer is used for generating an interface list according to interface setting and registration application, checking the interface application authority, controlling the interface to be matched with the interface application role, performing security level control and keyword control, and returning an interface calling result.
The invention is further configured to: the interface application conditions comprise an interface opening type, an interface application authorization state, a login level authorization state, a calling number state and a time limit state.
The invention is further configured to: when the interface is in an online state, judging whether the open type of the interface is consistent with the application, verifying the authorization authority, the used times of the interface and the set time limit, and when the conditions are consistent, performing corresponding login judgment according to different authorization levels; and when the conditions are not met, returning an interface authority exception result.
The invention is further configured to: the different authorization levels correspond to different interfaces and comprise login level authorization, application level authorization, role level authorization and business level authorization, whether the application or the system authorizes the use of the interface or not is verified for the application level authorization, and whether the current login identity is legal or not is verified for the login level authorization under the condition of the application level authorization.
The invention is further configured to: the interface service layer judges the authority of the role level authorization and the service level authorization, controls the role of interface processing data to be matched with the role of the user under the conditions of application level authorization and login level authorization, controls the interface service processing to only limit the data matched with the user service attribute, controls the security level and the key word of each level and returns an interface calling result.
The invention is further configured to: the service level authorization comprises user control, attribute control, mechanism control and department control, wherein the user control is used for controlling the interface to process user level data to be matched with the ID of a login user, the attribute control is used for controlling the interface to process the service data to be matched with the corresponding attribute of the login user, the mechanism control is used for controlling the interface to process the service data to be matched with the mechanism of the login user, and the department control is used for controlling the interface to process the service data to be matched with the department of the login user.
The invention is further configured to: according to interface setting, registration application and theme release, different authorization levels can be set for the same interface, interface information is obtained, an interface configuration library is generated, and interfaces are managed; receiving an interface application, checking application authority and application interface configuration, matching corresponding interfaces for application applications meeting conditions, and managing the configuration of the interfaces and the application applications.
In a second aspect, the above object of the present invention is achieved by the following technical solutions:
a platform interface management system comprises a data open portal system, a data theme management system and an interface unified management system, wherein the data open portal system is used for submitting a registration application, an application, inquiring an audit result, browsing an approved interface list and using conditions; the data theme management system is used for browsing and defining a theme data interface; the interface unified management system is used for forming a unified authority control system by combining with a gateway, receiving registration application and subject issue of the data open portal system, generating an interface configuration library by combining with a subject data interface, configuring user authority, checking the authority, attribute and interface requirement of application according to login application, configuring a corresponding interface for the application, and setting return result data.
The invention is further configured to: the authority control system of the interface unified management system comprises a background management function for setting and using the interface, uniformly auditing data open application, uniformly authorizing a service interface and correcting error and classifying subjects; and the application for using the auditing interface comprises the application for using the theme data interface and the platform service interface, and the data security is audited.
In a third aspect, the above object of the present invention is achieved by the following technical solutions:
a platform interface management system terminal comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor executes the computer program to realize the control of the management system.
In a fourth aspect, the above object of the present invention is achieved by the following technical solutions:
a computer-readable storage medium, storing a computer program which, when executed by the processor, implements the control of the management system of the present application.
Compared with the prior art, the beneficial technical effects of this application do:
1. the method and the system have the advantages that management of a gateway layer and an interface service layer is controlled, different users are authorized in a grading mode, the different users are matched with corresponding interfaces according to authority, the same interface can correspond to a plurality of clients with different authorities at the same time, and unified management of the interfaces is achieved;
2. furthermore, the interface unified management system of the application sets the open interface of the platform, simultaneously performs unified management on the interface use, configures the times/period for using the interface, and performs the setting of returned result data, thereby realizing the management of the platform interface;
3. furthermore, the application controls the interface which is open to the application, and the authority control is required to be carried out, so that the interface authority open control is realized.
Drawings
Fig. 1 is a schematic diagram illustrating the structure and control flow of an interface unified management system according to an embodiment of the present application;
fig. 2 is a structural diagram of a platform interface management system according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Detailed description of the preferred embodiment
The interface unified management system generates an interface configuration library and manages interfaces according to interface setting, registration application and theme release; receiving an interface application, checking application authority and application interface configuration, matching corresponding interfaces for application applications meeting conditions, and managing the configuration of the interfaces and the application applications.
As shown in fig. 1, the gateway control layer is configured to implement authorization support for different open type interfaces, perform hierarchical interface authorization control, perform processing for desensitizing data according to security level, control quota, deadline, and result of login authorization to use an interface, and perform different processing according to different user authorization levels.
And the interface service layer performs different login processing on the role-level authorized user and the service-level authorized user, performs security level control and keyword control on all authorized users, and returns an interface calling result according to the user authority.
Specifically, the gateway control layer lists the interfaces to form an interface configuration library, which comprises a theme open interface, a platform service interface and a user registration interface, checks the interface state, including checking whether the interfaces are online or not, the interface open type, counting the interface scheduling condition, verifying the current login authority, whether the interfaces authorize the current login, checking the level of calling the interfaces and the like, and allocates corresponding interfaces to login users of different levels.
The theme open interface is interface type open data established by a data theme management system.
The platform service interface is an interface which is added or annotated by an interface unified management system and is automatically imported.
The interface authorization levels include: application level authorization, login level authorization, role level authorization and service level authorization.
And the application level authorization is realized, and an application person needs to apply for the authorization before using the interface.
And (4) login level authorization, wherein under the condition of application level authorization, a user can use the interface only by having legal login identity.
And (4) role-level authorization, wherein the user can only use data matched with the user role through an interface under the conditions of application-level authorization and login-level authorization.
And service-level authorization, wherein under the conditions of application-level authorization and login-level authorization, a user can only use data of which the interface is matched with the service attribute of the user.
Thus, it is possible to use the same interface for data processing for different users.
The open type of interface includes applying for authorized use, without authorization.
And verifying whether the body of the current login user is effective, if the identity is effective, whether the login times reach a set time value or not, and if the login times are within a set time limit, asynchronously counting the times of calling an interface of the login user, and carrying out corresponding processing according to the user authority.
It is verified whether the interface authorizes the logged-on user.
The user related authority attribute is instantiated, data of the current login user in the use period are cached, and frequent initialization of the user data caused by high-frequency calling of an interface is avoided. The user-related permission attributes include: the system comprises user information, user attributes, user mechanisms, user departments and the like, wherein the user information comprises attributes such as user ID/account/name and the like, and the user attributes comprise various information corresponding to the user.
In the interface implementation class needing role-level authorization and service-level authorization control, a user authority attribute component packet is introduced to judge whether the interface registration information is role-level authorization or service-level authorization.
Role-level authorization: in the service interface implementation code, it needs to verify whether the role parameter value is consistent with the role value in the user authority attribute, if not, the interface directly returns the authority exception.
And (3) service level authorization: and controlling authorization granularity of different service attributes which are divided into users/attributes/organizations/departments.
And user control, namely obtaining a user ID in the user authority attribute in the service interface code, and performing user-level range control on the returned data to avoid cross-user data boundary operation.
And attribute control, namely setting service attribute authority aiming at an interface, wherein in a service interface code, an attribute parameter value needs to be limited to be an attribute value in the current user authority attribute, so that the cross-attribute data operation is avoided.
Mechanism control: in the service interface code, the mechanism in the user authority attribute can be obtained according to the mechanism control strategy configured by interface registration, and the mechanism-level range control is carried out on the returned data, so that data out-of-range access is avoided. The method comprises the following steps: the mechanism can be seen/directly subordinate superior mechanism can be seen/all inferior mechanism can be seen/all superior mechanism can be seen.
And (4) department control: in the service interface code, the department in the user authority attribute can be obtained according to the department control strategy configured by interface registration, and department level range control is carried out on the returned data, so that data out-of-range access is avoided. The method comprises the following steps: the department can see/directly belong to the subordinate department/directly belong to the superior department/all the subordinate departments/all the superior departments.
And (4) safety level control, namely aiming at the safety level of interface registration configuration, confusion encryption processing is carried out on fields related to sensitive information in a returned data set, such as a mobile phone number, a password, a certificate number and a mailbox, in an interface layer.
And returning result set field control, when the interface is applied for use, checking or setting the result set field which is allowed to be returned by the interface for a user, and shielding (Remove) the field which is not allowed to be returned in a returned (Response) data set in an interface layer.
The application user proposes an application, the interface unified management system carries out different levels of authorization on different users according to the interface authorization level to obtain the interface use authority, when the user logs in, the user authority and the interface authorization level are checked, corresponding interfaces are configured for different users, and different levels of authorization are set for the same interface to correspond to different application requirements.
In one embodiment of the present application, the unified interface management system is applied to big data education, and a user invokes an interface, including the following steps:
s1, checking whether the interface is on line, if so, entering the next step, and if not, turning to S17;
s2, checking the opening type of the interface;
s3, for the application authorization open interface, verifying whether the current login user call interface exceeds the set number, if not, entering the next step, if yes, turning to S17;
s4, verifying whether the current login user call interface exceeds the set time limit, if not, entering the next step, if yes, turning to S17;
s5, judging the authorization level of the login user to the interface, entering the next step for login level authorization, turning to S7 for application level authorization, turning to S8 for role level authorization, and turning to S9 for business level authorization;
s6, verifying whether the identity of the login user is legal, if so, turning to S14, and if not, turning to S17;
s7, verifying whether the application user or the system user is authorized to use the current interface, if so, turning to S14, and if not, turning to S17;
s8, judging whether the role of the interface processing data is matched with the user role, if yes, turning to S14, and if not, turning to S17
S9, respectively performing user control, attribute control, mechanism control and department control on the service level authorization;
s10, judging whether the interface processing user-level data is matched with the ID of the login user, if so, entering the next step, and if not, turning to S17;
s11, judging whether the service data processed by the interface is matched with the corresponding attribute of the login user, if so, entering the next step, and if not, turning to S17;
s12, judging whether the service data processed by the interface is matched with the login user mechanism, if so, entering the next step, and if not, turning to S17;
s13, judging whether the service data processed by the interface is matched with the logged user department, if so, entering the next step, and if not, turning to S17;
s14, entering security level control, and encrypting the sensitive fields contained in the returned result;
s15, controlling the returned fields, and shielding the fields which are not returned in the returned result;
s16, returning an interface calling result to the user, and turning to S18;
s17, returning an interface authority exception result;
and S18, ending.
User attributes include user school stage, grade, class, discipline, etc.
Detailed description of the invention
The platform interface management system comprises a data open portal system, a data subject management system and an interface unified management system, wherein the data open portal system is used for submitting a registration application, an application, inquiring an audit result, browsing an approved interface list and using conditions; the data theme management system is used for browsing and defining a theme data interface; the interface unified management system is used for combining a gateway to form a unified authority control system, receiving registration application and subject issue of the data open portal system, combining a subject data interface, generating an interface configuration library, configuring user authority, checking the authority, attribute and interface requirement of the application according to login application, configuring a corresponding interface for the application, and setting return result data
The authority control system of the interface unified management system comprises a background management function for setting and using the interface, uniformly auditing data open application, uniformly authorizing a service interface and correcting error and classifying subjects; and the application for using the auditing interface comprises the application for using the theme data interface and the platform service interface, and the data security is audited.
The interface unified management system collects interface registration information to the interface management platform, registers a new interface, updates records in the interface management platform after the interface information is modified or adjusted, and the registration information comprises:
interface name, source system, interface function description, request mode, authorization level.
The source system represents the system to which the interface belongs.
A data open portal system for providing application developers with: the interface list, the interface details, my application, the approved interface, the use condition and other information, and the approval data of the interface application and the interface unified management system are received.
The interface unified management system receives the interface application data of the data open portal system, and returns the approval data to the data open portal system after approval.
The interface opened to the application must realize the authority control system required by the requirement, and can be opened to the application for use after being registered through the interface.
Each application uses the interface, and the related interface use permission is acquired through the application process, so that the application can be normally used after the platform is authorized to permit.
Unified management of interfaces: the method comprises the steps of setting an open interface of a platform, simultaneously carrying out unified management on interface use, configuring the times/time limit of using the interface by an application, and setting returned result data.
And carrying out authorization support of different open types, authorization hierarchical control, processing of desensitization of security level to data, and control of quota, duration and result of an application authorization use interface.
Detailed description of the preferred embodiment
An embodiment of the present invention provides a platform interface management system terminal, including an interface unified management system terminal device or a platform interface management system terminal device, where the terminal device in this embodiment includes: a processor, a memory and a computer program, such as a path weighted availability calculation program, stored in the memory and executable on the processor, the processor implementing the methods of embodiments 1, 2 when executing the computer program.
Illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory and executed by the processor to implement the invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, and the instruction segments are used for describing the execution process of the computer program in the interface unified management system terminal device or the platform interface management system terminal device. For example, the computer program may be divided into a plurality of modules.
The interface unified management system terminal device or the platform interface management system terminal device may be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing devices. The interface unified management system terminal device or the platform interface management system terminal device may include, but is not limited to, a processor and a memory. It will be understood by those skilled in the art that the foregoing examples are merely examples of the terminal device of the interface unified management system or the terminal device of the platform interface management system, and do not constitute a limitation of the terminal device of the interface unified management system or the terminal device of the platform interface management system, and may include more or less components, or combine some components, or different components, for example, the terminal device of the interface unified management system or the terminal device of the platform interface management system may further include an input/output device, a network access device, a bus, and the like.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The general processor may be a microprocessor, or the processor may be any conventional processor, and the processor is a control center of the terminal device of the interface unified management system or the terminal device of the platform interface management system, and various interfaces and lines are used to connect various parts of the terminal device of the interface unified management system or the terminal device of the platform interface management system.
The memory may be configured to store the computer program and/or the module, and the processor may implement various functions of the terminal device of the interface unified management system or the terminal device of the platform interface management system by executing or executing the computer program and/or the module stored in the memory and calling data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
Detailed description of the invention
The module/unit integrated with the terminal device of the interface unified management system or the terminal device of the platform interface management system may be stored in a computer readable storage medium if it is implemented in the form of a software functional unit and sold or used as an independent product. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.

Claims (10)

1. An interface unified management system, characterized in that: the gateway management layer is used for judging the interface state, determining the interface application condition, judging the interface online state, confirming the interface type and verifying the interface calling authority; the interface service layer is used for generating an interface list according to interface setting and registration application, checking the interface application authority, controlling the interface to be matched with the interface application role, performing security level control and keyword control, and returning an interface calling result.
2. The interface unification management system according to claim 1, wherein: the interface application conditions comprise an interface opening type, an interface application authorization state, a login level authorization state, a calling number state and a time limit state.
3. The interface unification management system according to claim 2, wherein: when the interface is in an online state, judging whether the open type of the interface is consistent with the application, verifying the authorization authority, the used times of the interface and the set time limit, and when the conditions are consistent, performing corresponding login judgment according to different authorization levels; and when the conditions are not met, returning an interface authority exception result.
4. The interface unification management system according to claim 3, wherein: the different authorization levels correspond to different interfaces and comprise login level authorization, application level authorization, role level authorization and business level authorization, whether the application or the system authorizes the use of the interface or not is verified for the application level authorization, and whether the current login identity is legal or not is verified for the login level authorization under the condition of the application level authorization.
5. The interface unification management system according to claim 1, wherein: the interface service layer judges the authority of the role level authorization and the service level authorization, controls the role of interface processing data to be matched with the role of the user under the conditions of application level authorization and login level authorization, controls the interface service processing to only limit the data matched with the user service attribute, controls the security level and the key word of each level and returns an interface calling result.
6. The interface unification management system according to claim 5, wherein: the service level authorization comprises user control, attribute control, mechanism control and department control, wherein the user control is used for controlling the interface to process user level data to be matched with the ID of a login user, the attribute control is used for controlling the interface to process the service data to be matched with the corresponding attribute of the login user, the mechanism control is used for controlling the interface to process the service data to be matched with the mechanism of the login user, and the department control is used for controlling the interface to process the service data to be matched with the department of the login user.
7. The interface unification management system according to claim 1, wherein: according to interface setting, registration application and theme release, different authorization levels can be set for the same interface, interface information is obtained, an interface configuration library is generated, and interfaces are managed; receiving an interface application, checking application authority and application interface configuration, matching corresponding interfaces for application applications meeting conditions, and managing the configuration of the interfaces and the application applications.
8. A platform interface management system, characterized by: the system comprises a data open portal system, a data theme management system and an interface unified management system, wherein the data open portal system is used for submitting a registration application, an application, inquiring an audit result, browsing an approved interface list and using conditions; the data theme management system is used for browsing and defining a theme data interface; the interface unified management system is used for forming a unified authority control system by combining with a gateway, receiving registration application and subject issue of the data open portal system, generating an interface configuration library by combining with a subject data interface, configuring user authority, checking the authority, attribute and interface requirement of application according to login application, configuring a corresponding interface for the application, and setting return result data.
9. The platform interface management system according to claim 8, wherein: the authority control system of the interface unified management system comprises a background management function for setting and using the interface, uniformly auditing data open application, uniformly authorizing a service interface and correcting error and classifying subjects; and the application for using the auditing interface comprises the application for using the theme data interface and the platform service interface, and the data security is audited.
10. A platform interface management system terminal comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, characterized in that: the processor, when executing the computer program, implements the control of the management system according to any of claims 1-9.
CN202111674078.8A 2021-12-31 2021-12-31 Interface unified management system and platform interface management system Pending CN114417278A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111674078.8A CN114417278A (en) 2021-12-31 2021-12-31 Interface unified management system and platform interface management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111674078.8A CN114417278A (en) 2021-12-31 2021-12-31 Interface unified management system and platform interface management system

Publications (1)

Publication Number Publication Date
CN114417278A true CN114417278A (en) 2022-04-29

Family

ID=81271839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111674078.8A Pending CN114417278A (en) 2021-12-31 2021-12-31 Interface unified management system and platform interface management system

Country Status (1)

Country Link
CN (1) CN114417278A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102784A (en) * 2022-07-21 2022-09-23 武汉联影医疗科技有限公司 Authority information management method, device, computer equipment, storage medium and product
CN117393134A (en) * 2023-12-11 2024-01-12 南京引光医药科技有限公司 Clinical data integrated management system and management method thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102784A (en) * 2022-07-21 2022-09-23 武汉联影医疗科技有限公司 Authority information management method, device, computer equipment, storage medium and product
CN115102784B (en) * 2022-07-21 2023-06-23 武汉联影医疗科技有限公司 Rights information management method, device, computer equipment and storage medium
CN117393134A (en) * 2023-12-11 2024-01-12 南京引光医药科技有限公司 Clinical data integrated management system and management method thereof
CN117393134B (en) * 2023-12-11 2024-02-09 南京引光医药科技有限公司 Clinical data integrated management system and management method thereof

Similar Documents

Publication Publication Date Title
CA2968248C (en) Identity infrastructure as a service
US7350226B2 (en) System and method for analyzing security policies in a distributed computer network
TW202011244A (en) Method and device for acquiring and feeding back user resource, and electronic apparatus
US8990896B2 (en) Extensible mechanism for securing objects using claims
US20030115484A1 (en) System and method for incrementally distributing a security policy in a computer network
US11658983B2 (en) Authentication and authorization across microservices
US11888856B2 (en) Secure resource authorization for external identities using remote principal objects
KR20100045442A (en) Transferable restricted security tokens
CN114417278A (en) Interface unified management system and platform interface management system
US11233800B2 (en) Secure resource authorization for external identities using remote principal objects
US11553000B2 (en) Systems and methods for using namespaces to access computing resources
US11089028B1 (en) Tokenization federation service
US20230195877A1 (en) Project-based permission system
AU2012266675A1 (en) Access control to data stored in a cloud
CN111062028A (en) Authority management method and device, storage medium and electronic equipment
US11477187B2 (en) API key access authorization
CN116090000A (en) File security management method, system, device, medium and program product
CN111147496B (en) Data processing method and device
CN112464215A (en) Identity authentication and control method for enterprise service system
US11947657B2 (en) Persistent source values for assumed alternative identities
US20220417240A1 (en) Virtual Machine Provisioning and Directory Service Management
CN113114635A (en) Authority management method and system
Jensen et al. Policy expression and enforcement for handheld devices
CN115766100A (en) System resource authority management method, electronic device and storage medium
WO2023104801A1 (en) Conditional access to data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination